meteor-bg
soc-bg
trust-bg

The implementation.

The implementation of the services is clearly simplified by RadarServices’ best practices. Every step, from recording a client’s requirements and completing a proof-of-concept to day-to-day operation, is straight forward and steered by the RadarServices team. Together with you, we develop a plan for the introduction of the services, always considering criticality of servers and services and the need for protection of the respective data. The implementationof the services does not interfere with day-to-day operations. The security level of the IT infrastructure will be enhanced continuously and step by step.

The main technical requirements include:

  • Implementation of a VPN between RadarServices SOC and the client
  • Assignment of IP addresses and access for the RadarAppliance
  • Configuration of a mirror port / span port to mirror network traffic
  • Implementation of accounts for authenticated vulnerability scans
  • Forwarding of logs to the RadarAppliance
  • Allocation of agents, necessary only for Host-based Intrusion Detection