Vertech Managed Firewall Service - Monitoring and Support
Protect against unauthorized access to valuable business resources and help ensure network security and availability with Vertech Managed Firewall Services. These services also include advanced monitoring and reporting to help you comply with security and regulatory requirements.
Use Cyberoam Features to Block Cryptowall Ransomware Attacks!
Besides all these other features our solution offers the most important is this appliances ability to stop these damaging attacks from delivering their payload. See this article for technical info.
Our Cyberoam based solution offers enterprise level security and performance at a price SMB's can finally afford. Let us help get you protected now.
Cloud Based Console
Security management by enabling centralized policy creation and implementation and signature updates for Cyberoam network security appliances deployed at branch offices and client offices for all security features like Firewall, Intrusion Prevention System, Anti-Virus scanning, and more. This allows real-time protection against zero-hour threats in enterprises and reduces response time against newly identified threats across multiple customer networks
Centralized policy implementation, simplifying security management and maintaining high levels of security across all customer locations and remote offices despite the lack of technical resources at these locations. Update of rules and policies can be centrally scheduled for individual or groups of network security appliances.
Tracking and rolling back configuration changes of managed Cyberoam appliances. Enterprises can audit policy or device changes to review compliance and track deviations from the required security policy.
Logs and Alerts
Our Log Viewer offers logs and views of administrator actions on dispersed Cyberoam network security appliances, which helps in investigative analysis, supports regulatory compliance as well as keeps track of historical activities across distributed networks.
Email alerts can be set for individual or group of Cyberoam security appliances across branch offices and client offices based on expiry of subscription modules, excess disk usage, IPS and virus threat counts, unhealthy surfing hits and other parameters.
Offers aggregated reporting across multiple devices and locations, providing 1200+ reports that give administrators a clear view of user & network activities and help identify trends that enable faster decision making.
Allows identification of network attacks, their source and destination, enabling rapid action through a quick glance at the iView dashboard, its drill-down reports and identity-based logging and reporting .
Identity based reporting offers visibility into user activities with reports such as top users consuming maximum bandwidth for uploads and downloads, top web users, users doing unproductive web surfing, users accessing P2P and other risky applications, top attackers and victims, and more.
If your Internet Firewalls aren't being watched contact the Vertech team today.