The core focus of Biznet is to keep networks and applications running - and to help assure that viruses, worms and other attacks do not impact the network or affect operations. Biznet has invested in developing and applying tools to achieve world-class reliability, security features and business continuity for businesses. Each security service in the Biznet portfolio provides a different and enhanced layer of protection
Biznet Managed Firewall services help protect organizations infrastructures with various network security functions. These fully-managed solutions are configured to match your specific requirements with flexibility to select the right level of protection.
By placing firewall functionality into the Biznet network infrastructure, Biznet Network-Based Firewall service inspects inbound and outbound traffic and is designed to take action according to your predefined security policies. You can also select your company's required bandwidth allocation for Internet access globally through the firewall. The service is available world-wide with firewall configurations ranging from simple outbound only security policy to extensive bi-directional policy with optional features, such as Web filtering, malware scanning, intrusion detection and prevention, Application Control, Data Loss Prevention as well as support to protect multiple, independent network segments.
Biznet Web Application Firewall service is a fully managed security service that combines Web Application Firewall technology with expert management . Web Application Firewalls are deployed in front of the application servers as a transparent Layer 2 bridge at the customer premises or in a Hosted environment. It provides protection without interrupting legitimate traffic to web applications.
Organizations need to know who is gaining access to network applications to help avoid unauthorized disclosure of sensitive information. This risk of exposing proprietary and sensitive information is magnified as the number of remote users accessing the network increases. Token Authentication service is a network access protection method that uses an enhanced security feature, called two-factor authentication, which requires a user to provide two unique factors to gain access to a private network: something they know (a password or PIN) and something they possess (an authenticator). This method makes it more difficult for a hacker to gain access to authentication credentials since the authenticator's token code changes randomly every sixty seconds and must be combined with a secret PIN selected by the user accessing the network
Endpoint Security service is a fully managed solution to help protect both end users and company's internal systems from external hazards posed by doing business on the Internet. The service is designed to enforce compliance with customer-defined policies for firewall, anti-virus and software compliance at remote end points. The service also provides centralized management tools for control of remote end points and a path for customer to gain control over the applications operating on these end points
The Premises-Based Firewall service utilizes industry-leading firewall platforms from Cisco, Checkpoint, Fortinet and Juniper. They protect your network perimeter from the hazards resulting from connecting the Internet with your private network. Premises-Based solutions scale from small, home office environments to large globally distributed organization networks. The standard powerful firewall capability is complimented with the ability to add optional features including high availability, support for complex security policy, VPN, DMZ/extranet support and the Unified Threat Management (UTM) capabilities of Intrusion Prevention Service, Anti-Virus filtering, Anti-Spam protection and URL content filtering.
You retain control while achieving lower TCO, improved business performance, assured service levels and reduced risk: we help you create a more flexible, agile and 'always on' business.
Biznet Managed IT Services from data centre to cloud service, from consulting to service desk and remote hand support, will slot into your own IT service delivery model at any level required.
All services are aligned to the IT Infrastructure Library (ITILTM) framework for industry best practice. Service delivery includes: Service Delivery Management
|a)||1st level Support 24x7x365|
|- Internet Connection||Yes|
|- Customer Care||Yes|
|b)||2nd level Support 24x7x365|
|- Technical Assistance Center|
|- OS and 3rd Party Apps Support|
|- Senior Engineer|
|- Project based|
|- IMACD (Install, Move, Additings, Changes, Disposal)|
|- Service responsibilities information systems / Reporting|
|c)||Remote hand and eyes|
|- Visual verification to assist remote troubleshooting|
|- Pressing readily accessible buttons to reboot the device|
|- Reconfiguration of non-restricted cables with push-on type connectors|
|d)||System monitoring and management|
|- Availability monitoring|
|- Performance monitoring|
|- Application and service monitoring|
|- System Backup Failure Monitoring|
|- IPS/IDS Monitoring|
|- MRTG (Network Monitoring)|
|- Management Service Responsibilities|
|- Operational Procedure|
|- Service Level Agreement Monitoring|
|- Operation Level Agreement|
|- Monthly Service Review|
|- Semi annually service agreement review|
|- Periodic service performance review|
|- Provide Finding Report to Service Delivery & System Development|
|- Review log of production deployment|
|- Changes monitoring and workplan|
|- Changes review and documentation|
|h)||Security and Audit|
|- Vulnerability Assessment|
|- Intrusion Detection|
|- Penetration Test|
|- Security Audit|
|- Internal Audit reporting semiannually|
|- External Audit reporting annually|
|- Provide consulting services to assist you with the development and implementation of your firewall rule base|
|- Define load balancing and tuning of your content servers behind your firewall|
|- Supported encryption configuration and domains of your enabled client(s) to your firewall VPNs|
|- Implement changes to content security systems utilizing Content Vectoring Protocol and/or URL filtering protocol|
|- Provide query capability to mechanisms that contain user ids and passwords|
|- Perform network routing table(s) addition(s), subtraction(s) and ACLs|
|- Implement changes to externally established authentication and password protection systems, such as Steel-Belted Radius, Secure ID, and/or Telemate|
Managing enterprise back up has become increasingly compounded due to a multitude of reasons. Shrinking backup window and strict SLA adherence in global environment, risk due to backup failures, growing compliance requirement, explosion in data growth and cost constraints mean that organizations face complex challenges in backup management services. Enterprises need a robust backup management service that enables reduction in risk exposure and adheres to stringent service levels while being a cost effective solution.
Biznet provides various additional services to its customers to fulfill their requirements on top of Biznet standard services. Biznet Backup Service is one of the additional services provided to customers, to answer the customers needs to have backup of their servers collocated or hosted in Biznet data center or the cloud server services that they subscribed.
We are experienced in installing, configuring and maintaining the following solutions:
The backup service provides 3 options:
Biznet Backup Service will provide a standard 7, 14 or 30 days retention policy, which can be customized base on customer request.
24 x 7 x 365 remote backup management operations and monitoring.
ITIL based continual improvement
Perform multiple tasks like change requests, configuration management, addition, removal or decommissioning of backup client server
Maintain standardized document and SOPs
Proactive focus on ensuring backup timeliness and completion
Proprietary tools to improve backup management efficiency
Proven remote backup management process and methodologies
Multiple options like 24X7, 8X5 remote backup management services, after-hours support, etc
Growth in data complexity and storage requirements, along with the recent focus on corporate governance requirements, has forced many organizations to re-evaluate their data protection strategies.
For many customers, the answer has been to outsource data protection altogether. The advantages of a service-based approach are: