Managed Security Services (MSS) is a systematic approach to manage an organization's security needs. Odessa Advisors as an MSSP provides this service in both ways, in-premise as well as remote-management to oversees company’s network and information system security. This diverts the burden of performing the chores manually, which can be considerable, away from administrators.
This service entails tailor made facilitation in the evaluation of business risks, computing key business requirements for security and evolving security policies and processes. It may include comprehensive security architecture assessments and design (include technology, business risks, technical risks and procedures). Preparing Implementation plan, change management & corporate standard operating practice are integrated part of this consultancy service.
Once key business needs with regards to enterprise cyber security and implementation plan are worked out, Odessa Advisors assists their esteemed clients to select best-in-the-class hardware & software tools from the wide spectrum of options to meet the security requirements. This also includes defining scope of warranty & support by the OEM or the vendors.
Involves installing, upgrading, and managing the firewall, Virtual Private Network (VPN), intrusion detection hardware and software tools, electronic mail, and commonly performing configuration changes on behalf of the customer.
As an MSSP, Odessa Advisors takes the responsibility of managing & monitoring of the entire information technology infrastructure to ensure seemless flow of business. This involves moment to moment tracking and deciphering of important system events including unauthorized behaviour, malicious hacks, denial of service (DoS), anomalies, and trend analysis. It is the first step in an incident response process.
This is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed counter measures and evaluate their actual effectiveness after they are put into use.
This includes monitoring event logs not for intrusions, but for change management. Identifying changes in a system that infringe a formal security policy is the focus of this service. In short, it measures and judges compliance to an established technical risk model confirming to a formally laid out in house security policy.