Our Security Services

  • Security Monitoring of Networks, Applications, Databases
  • Hardening of operation systems, endpoint security
  • Incident Response
  • Vulnerability assessment
  • NIDS and HIDS management
  • Secure IT infrastructure design
  • Evaluation, Training, Design, Architecture, Penetration Testing
  • Compliance Management
  • Hybrid and cloud infrastructure design, configuration and management
  • SIEM
  • other IT services

Managed Security Services (MSS)

InForce can help you to design and implement a secure network infrastructure and to manage your servers, security devices and endpoints. Our focus is on providing turnkey solutions for your complex information security needs.

Our MSS allow us to act as an integral member of your IT, security, and leadership team to address information security challenges.

Managed Security Services include:

On-site consulting
  • Assistance in the assessment of business risks, key business requirements for security, and the development of security policies and processes.
  • Consulting in the security product integration, and on-site mitigation support after an intrusion has occurred, including emergency incident response and forensic analysis.
Remote perimeter management of the client's network
  • Our service, including installing, upgrading, and managing the security devices, (VPN) and intrusion detection hardware and software.
  • Management includes monitoring, maintaining the firewall's traffic routing rules, and generating regular traffic and management reports to the customer.
  • NIDS and HIDS management involves providing intrusion alerts to a customer, keeping up to date with new defenses against intrusion, and regularly reporting on intrusion attempts and activity.
Managed security monitoring

Day-to-day monitoring and interpretation of important system events throughout the network, including unauthorized behavior, malicious hacks and DDoS/DoS, anomalies and trend analysis.

Penetration testing and vulnerability assessments

Periodic software scans or hacking attempts in order to find vulnerabilities in a technical and logical perimeter.

Compliance monitoring

This includes monitoring event logs for change management. The service will identify changes to a system that violate a formal security policy.