Kerna Managed Services

By: Kerna  05/12/2011
Keywords: security, managed services, network services

Gap Analysis: Business Needs / IT Network

A gap analysis that looks at the difference between business needs and the IT network will throw up issues of performance, resilience, security and manageability that will inform both client planning and Kerna's Managed Services design. The vulnerability assessment will identify single points of failure and potential performance bottlenecks during peak traffic flows, as well as a prioritised assessment of internal and external threats and the adequacy of internal IT procedures.

Kerna has a pro-active approach to secure Managed Services that goes well beyond passive or reactive monitoring. We will help our clients update their security policy to match their business needs and to cope with the latest threats. Our structured approach based on identifying and prioritising all IT business risks, also ensures that clients IT infrastructure can securely support any planned future business growth, including seasonal peaks in customer demand, as well as defend against both internal and external threats.

Resilient network design together with sophisticated monitoring will enable clients to manage and to recover quickly from major external events, such as a power outage, or a large distributed denial of service attack.

Kerna's assessment of security vulnerabilities is based upon the industry proven principles outlined in ISO17799. We recommend that our clients progressively implement the ISO17799 industry best practice approach to IT security, as adopting this structured methodology will enable most regulatory compliance targets to be hit. Kerna will work with the regulatory compliance standards applicable to a particular client, such as Sarbanes-Oxley, EU Data Protection legislation or Basle II.

Managed Network Services

Kerna's bespoke approach to managed services enables an organisation to match its risk and resources profile with an appropriate level of managed service. Managed Network Services include:

  • Full or partial outsourced service management.
  • Help Desk during normal business hours.
  • User provisioning management for identity and access control systems.
  • 24x7 remote monitoring with flexible configuration to avoid spurious alarms.
  • Systems and network problem diagnosis. Software component fault resolution.
  • Software upgrades. Configuration change control advice and management.
  • Threat analysis. Risk reduction and compliance consulting
  • Optional on-site client support, either short or long-term.
  • Business continuity planning.
  • Emergency response team for the effective management of major incidents.
  • Service Level Agreement tailored to match client needs.

Keywords: Managed Network Services, managed services, Network Design, network services, Risk Reduction, security, Security Policy

Other products and services from Kerna

05/12/2011

Kerna Communications Products

These vendors have been carefully selected by us to ensure that they offer a full breadth of solutions based on the different criteria specified by the client. Kerna has an extensive list of product suppliers from whom we can source equipment and software as part of our solutions and managed services offerings. These factors typically include performance, resilience, scalability, cost as well as core functionality requirements.


05/12/2011

Kerna Communications Ireland

Security solutions are not commodity items sold on price and service but rather require an in-depth understanding of the issues and the ability to assist clients achieve the correct balance between the different factors such as cost, performance, availability and risk.


05/12/2011

Log and Compliance

A large network continuously generates high volumes of log data from high performance security products such as firewalls and identity management systems. A major organisation has evolved a heterogeneous mix of technologies and devices from different vendors. Even for the same device type the data recorded by different vendors is typically different. Event logs enable unusual events and threats to be identified and remedial action taken.