Managed Security Services
Hold your infrastructure in safe hands.
Managed Security Services Partner
Management and information security comes as very important steps in securing your workstations and users. Detect and respond to cyber attacks before your critical data is compromised and let us be your managed security services provider.
What is the difference between
anti-virus and anti-malware?
An advanced anti-virus and anti-malware solution for your business.
Anti-virus focuses on prevention, protecting a machine by stopping it from becoming infected in the first place. Anti-malware, however, is geared towards rooting out and destroying malicious programs that have already been downloaded and activated. While there is a lot of crossover between the two tools, many security experts advise using both antivirus and anti-malware tools together in order to maximise protection.
How can ITAF help you with implementing the anti-virus and anti-malware software?
Whether it is about the general purpose protection for your end-points or on the other hand more specialized layer of defence specifically designed to fight the ransomware (link to ransomware blog post page) and Trojans, ITAF will provide you a first class service and consultancy (link to contact form) in guarding your devices/operating systems from exploits and viruses. This for end-points and for servers.
What is the difference between
anti-virus and anti-malware?
An advanced anti-virus and anti-malware solution for your business.
Anti-virus focuses on prevention, protecting a machine by stopping it from becoming infected in the first place. Anti-malware, however, is geared towards rooting out and destroying malicious programs that have already been downloaded and activated. While there is a lot of crossover between the two tools, many security experts advise using both antivirus and anti-malware tools together in order to maximise protection.
How can ITAF help you with implementing the anti-virus and anti-malware software?
Whether it is about the general purpose protection for your end-points or on the other hand more specialized layer of defence specifically designed to fight the ransomware (link to ransomware blog post page) and Trojans, ITAF will provide you a first class service and consultancy (link to contact form) in guarding your devices/operating systems from exploits and viruses. This for end-points and for servers.
Secure Desktop Management
The role of integrated desktop management
keeping your organisation’s endpoints secured
Secure and integrated desktop management is getting more important since GDPR has been introduced. Several aspects of the integrated desktop management solution by ITAF focus on helping an organisation keeping the personal data of end users secure. Of course the main goal remains proper, secure and efficient end user support.
The key features where ITAF can help you with integrated desktop management:
Asset
management
Remote
support
Software
deployment
Comprehensive
reporting
GDPR
Secure Desktop Management
The role of integrated desktop management
keeping your organisation’s endpoints secured
Asset
management
Remote
support
Software
deployment
Comprehensive
reporting
GDPR
Desktop security patching
Periodical patching of vulnerabilities of the OS and 3rd party software
The objective of desktop security patching practice is to pro-actively fix known software vulnerabilities by ensuring that all security-related patches are installed on the customer’s end users’ computers. Security patching is an imperative part of an overall good security practice that avoids leaving systems vulnerable to known security faults which could pose a threat to the confidentiality, integrity or availability of the customer’s data.
Key features of this service comprise:
• Automated installation of security patches on end user computers covering Microsoft and Mac patches as well as widely used third-party applications like Adobe Acrobat, Mozilla Firefox, Java, and so on.
• Full control over when patches are downloaded and installed, allowing the user the skip the installation of the software up to a defined number of times before enforcing the installation
• Full visibility and reporting possibilities on patch deployment & status
• Ability to create on demand tasks for manually pushing patches
What tools ITAF security specialists use for desktop security patching?
ITAF uses a specialised tool for the deployment of security patches, which covers both Microsoft software, Mac software and 3rd party software for both Windows and Mac Operation Systems.
ITAF applies a standard patch policy and deployment schedule which includes the following characteristics:
• For Microsoft products, only patches marked as Security Updates by Microsoft are installed for all Microsoft products supported by the tool.
• For Mac and 3rd party products, only patches marked as Critical, Important or Moderate are installed
• The ability for users to delay the deployment and/or associated reboot of their computers up to a specified maximum number of days
• This policy is subject to change at any given moment in time without the requirement for ITAF to pro-actively inform the customer
Desktop security patching
Periodical patching of vulnerabilities of the OS and 3rd party software
The objective of desktop security patching practice is to pro-actively fix known software vulnerabilities by ensuring that all security-related patches are installed on the customer’s end users’ computers. Security patching is an imperative part of an overall good security practice that avoids leaving systems vulnerable to known security faults which could pose a threat to the confidentiality, integrity or availability of the customer’s data.
Key features of this service comprise:
• Automated installation of security patches on end user computers covering Microsoft and Mac patches as well as widely used third-party applications like Adobe Acrobat, Mozilla Firefox, Java, and so on.
• Full control over when patches are downloaded and installed, allowing the user the skip the installation of the software up to a defined number of times before enforcing the installation
• Full visibility and reporting possibilities on patch deployment & status
• Ability to create on demand tasks for manually pushing patches
What tools ITAF security specialists use for desktop security patching?
ITAF uses a specialised tool for the deployment of security patches, which covers both Microsoft software, Mac software and 3rd party software for both Windows and Mac Operation Systems.
ITAF applies a standard patch policy and deployment schedule which includes the following characteristics:
• For Microsoft products, only patches marked as Security Updates by Microsoft are installed for all Microsoft products supported by the tool.
• For Mac and 3rd party products, only patches marked as Critical, Important or Moderate are installed
• The ability for users to delay the deployment and/or associated reboot of their computers up to a specified maximum number of days
• This policy is subject to change at any given moment in time without the requirement for ITAF to pro-actively inform the customer
Server Security Patching
What does server security patching include?
The server security patching service includes the activities related to the monitoring and implementation of security updates on the server systems of a customer. The server operating systems and third party software is being patched on a permanent basis.
• For Windows, automated security patching runs on a weekly basis to install all official security related updates published by Microsoft. This service delivers updates for Microsoft operating systems and other Microsoft software products for which Microsoft provides a security update service.
• Any other software is excluded from the automated security patching service.
How can ITAF manage server security patching and permanent patching of the vulnerabilities of your servers.
When ITAF is signalled by its server security patching monitoring systems that an update has failed or did not run, a staff member creates a pro-active incident ticket based on which the customer will be informed about the alert. This triggers an investigation to identify the root cause of the security update failure and any corrective actions that may be required to result in successful security updates. Corrective actions are tracked in a change request ticket.
Server Security Patching
What does server security patching include?
The server security patching service includes the activities related to the monitoring and implementation of security updates on the server systems of a customer. The server operating systems and third party software is being patched on a permanent basis.
• For Windows, automated security patching runs on a weekly basis to install all official security related updates published by Microsoft. This service delivers updates for Microsoft operating systems and other Microsoft software products for which Microsoft provides a security update service.
• Any other software is excluded from the automated security patching service.
How can ITAF manage server security patching and permanent patching of the vulnerabilities of your servers.
When ITAF is signalled by its server security patching monitoring systems that an update has failed or did not run, a staff member creates a pro-active incident ticket based on which the customer will be informed about the alert. This triggers an investigation to identify the root cause of the security update failure and any corrective actions that may be required to result in successful security updates. Corrective actions are tracked in a change request ticket.
Secure Data Disposal
There are several complexities associated with security when speaking about data disposal, as the companies can not just throw away their old equipment as they like or pass them to the third party companies due to the associated data security, safety, confidentiality, compliance and environmental risks/policies with it. For disposal of outdated IT assets such as servers, hard drives, storage, networking and other data center equipment, ITAF is providing a secure environment friendly data disposal service with a comprehensive solution for data security following all the International Security Standards.
How can ITAF help you with Secure data disposal?
• Hardware registration – You can contact ITAF support and after the completion of registration, we will set an inventory to capture your outdated IT assets’ serial numbers, models and quantities.
• On site data destruction – At ITAF we have well trained and experienced professionals, that can assist you in selecting the most secure and suitable method of destroying your data. We also offer on-site & off-site services such as: data wiping, degaussing, crushing and shredding.
• Hardware recycling – To guarantee zero landfill, zero incineration, ITAF utilizes recognized green solutions. We ensure that all the materials are processed in an eco-friendly manner to maximize the re-use of all the components.
• Secure data disposal acknowledgement – At the end of the process, ITAF’s team will provide full documentation, acknowledging that the Data was destroyed and/or your outdated IT assets were recycled according to the industry’s best practice.
Secure Data Disposal
There are several complexities associated with security when speaking about data disposal, as the companies can not just throw away their old equipment as they like or pass them to the third party companies due to the associated data security, safety, confidentiality, compliance and environmental risks/policies with it. For disposal of outdated IT assets such as servers, hard drives, storage, networking and other data center equipment, ITAF is providing a secure environment friendly data disposal service with a comprehensive solution for data security following all the International Security Standards.
How can ITAF help you with Secure data disposal?
• Hardware registration – You can contact ITAF support and after the completion of registration, we will set an inventory to capture your outdated IT assets’ serial numbers, models and quantities.
• On site data destruction – At ITAF we have well trained and experienced professionals, that can assist you in selecting the most secure and suitable method of destroying your data. We also offer on-site & off-site services such as: data wiping, degaussing, crushing and shredding.
• Hardware recycling – To guarantee zero landfill, zero incineration, ITAF utilizes recognized green solutions. We ensure that all the materials are processed in an eco-friendly manner to maximize the re-use of all the components.
• Secure data disposal acknowledgement – At the end of the process, ITAF’s team will provide full documentation, acknowledging that the Data was destroyed and/or your outdated IT assets were recycled according to the industry’s best practice.
Pricing Options
Secure Desktop
Management
-
Asset Management
-
Remote Support
-
Software Deployment
-
Comprehensive Reporting
-
GDPR
Desktop Security
Patching
-
Automated installation
-
Security Updates by Microsoft
-
Critical, Important or Moderate
-
Delayed deployment
-
Associated computer reboot
Server Security
Patching
-
Weekly security patching
-
Official Microsoft updates
-
Update failure notification
-
Other software exclusion
-
Correactive actions tracking
Managed Security Services Partner
Hold Your Infrastructure in Safe Hands
With managed security, you’re able to focus on strategic security priorities, as the provider manages the day-to-day threat management, data protection, and ongoing compliance requirements.
As your trusted security partner, ITAF Managed Security Services offers around-the-clock monitoring, management and response to advanced threats, risks and compliance requirements.
For more information about ITAF Managed Security Services please contact us and we’ll be glad to help you!
- info@itaf.eu
- +32 9 277 90 00
Better to be safe than sorry.
Why ITAF?
Expericence and knowledge in figures and facts
ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.
ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.
ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.
Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.
Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.
Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.
More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.
More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.
More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.
More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.
More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.
More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.
ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.
ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.
ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.
ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.
ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.
ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.