Overview

Managed Security Service

The core focus of Biznet is to keep networks and applications running - and to help assure that viruses, worms and other attacks do not impact the network or affect operations. Biznet has invested in developing and applying tools to achieve world-class reliability, security features and business continuity for businesses. Each security service in the Biznet portfolio provides a different and enhanced layer of protection.

Firewall Security

Biznet Managed Firewall services help protect organizations infrastructures with various network security functions. These fully-managed solutions are configured to match your specific requirements with flexibility to select the right level of protection.

Network Based Firewall

By placing firewall functionality into the Biznet network infrastructure, Biznet Network-Based Firewall service inspects inbound and outbound traffic and is designed to take action according to your predefined security policies. You can also select your company's required bandwidth allocation for Internet access globally through the firewall. The service is available world-wide with firewall configurations ranging from simple outbound only security policy to extensive bi-directional policy with optional features, such as Web filtering, malware scanning, intrusion detection and prevention, Application Control, Data Loss Prevention as well as support to protect multiple, independent network segments.

Web Application Firewall

Biznet Web Application Firewall service is a fully managed security service that combines Web Application Firewall technology with expert management . Web Application Firewalls are deployed in front of the application servers as a transparent Layer 2 bridge at the customer premises or in a Hosted environment. It provides protection without interrupting legitimate traffic to web applications.

Token Authentication Service

Organizations need to know who is gaining access to network applications to help avoid unauthorized disclosure of sensitive information. This risk of exposing proprietary and sensitive information is magnified as the number of remote users accessing the network increases. Token Authentication service is a network access protection method that uses an enhanced security feature, called two-factor authentication, which requires a user to provide two unique factors to gain access to a private network: something they know (a password or PIN) and something they possess (an authenticator). This method makes it more difficult for a hacker to gain access to authentication credentials since the authenticator's token code changes randomly every sixty seconds and must be combined with a secret PIN selected by the user accessing the network.

Endpoint Security

Endpoint Security service is a fully managed solution to help protect both end users and company's internal systems from external hazards posed by doing business on the Internet. The service is designed to enforce compliance with customer-defined policies for firewall, anti-virus and software compliance at remote end points. The service also provides centralized management tools for control of remote end points and a path for customer to gain control over the applications operating on these end points.

Premises-Based Firewall

The Premises-Based Firewall service utilizes industry-leading firewall platforms from Cisco, Checkpoint, Fortinet and Juniper. They protect your network perimeter from the hazards resulting from connecting the Internet with your private network. Premises-Based solutions scale from small, home office environments to large globally distributed organization networks. The standard powerful firewall capability is complimented with the ability to add optional features including high availability, support for complex security policy, VPN, DMZ/extranet support and the Unified Threat Management (UTM) capabilities of Intrusion Prevention Service, Anti-Virus filtering, Anti-Spam protection and URL content filtering.

How do you benefit?

You retain control while achieving lower TCO, improved business performance, assured service levels and reduced risk: we help you create a more flexible, agile and 'always on' business.

  • Closed Rack Space
  • Secure Suite Space
  • Customize Space

What's Covered?

Biznet Managed IT Services from data centre to cloud service, from consulting to service desk and remote hand support, will slot into your own IT service delivery model at any level required. All services are aligned to the IT Infrastructure Library (ITILTM) framework for industry best practice. Service delivery includes: Service Delivery Management.

Program Management

Services including program planning and scheduling, program governance, risk mitigation, interface and liaison with client/third party vendors and providing overall communications, including reporting.

Vendor Management

Provides liaison services with third party vendors for hardware, software and related services. monitor vendor contractual commitments and service levels. manage vendor related escalations and deliverables.

Production Management

Services provided to ensure minimal disruption in the production environment and includes assigning a focal point in the production control center to attend to critical issues. change management processes to control changes in the production environment.

Service Desk

Services provided to handle and monitor incidents raised by the client and provide problem resolution within the defined sla period. it also includes providing daily and monthly metrics on incident volumes and status.

Service Level Management

Services provided to monitor, review and report the sla's as agreed with the client.

Release Management

Services provided include requirements management, change and version management related to what will be built for every release based on the approved release plan by the client.

Scope of Work Managed Services

A. 1st Level Support 24 x 7 x 365
  • Yes
    Environment
  • Yes
    Internet Connection
  • Yes
    Customer Care
B. 2nd Level Support 24 x 7 x 365
  • Technical Assistance Center
  • OS and 3rd Party Apps Support
  • Senior Engineer
  • Project based
  • IMACD (Install, Move, Additings, Changes, Disposal)
  • Service responsibilities information systems / Reporting
C. Remote Hand and Eyes
  • Visual verification to assist remote troubleshooting
  • Pressing readily accessible buttons to reboot the device
  • Reconfiguration of non-restricted cables with push-on type connectors
D. System Monitoring & Management
  • Availability monitoring
  • Performance monitoring
  • Application and service monitoring
  • System Backup Failure monitoring
  • IPS/IDS monitoring
  • MRTG (Network monitoring)
E. Tools Monitoring
  • Zenoss
  • Nagios
  • BMC/Remedy
F. Daily Operations
  • Management service responsibilities
  • Execution
  • Operational Procedure
  • Planning
G. Quality Management
  • Service level agreement monitoring
  • Operation level agreement
  • Monthly service review
  • Semi annually service agreement review
  • Periodic service performance review
  • Provide finding report to Service Delivery & Sistem Development
  • Review log of production deployment
  • Changes monitoring and workplan
  • Changes review and documentation
H. Security and Audit
  • Vulnerability assessment
  • Intrusion detection
  • Penetration test
  • Security audit
  • Internal audit reporting semiannually
  • External audit reporting annually
I. Firewall Management
  • Provide consulting services to assist you with the development and implementation of your firewall rule base
  • Define load balancing and tuning of your content servers behind your firewall
  • Supported encryption configuration and domains of your enabled client(s) to your firewall VPNs
  • Implement changes to content security systems utilizing Content Vectoring Protocol and/or URL filtering protocol
  • Provide query capability to mechanisms that contain user ids and passwords
  • Perform network routing table(s) addition(s), subtraction(s) and ACLs
  • Implement changes to externally established authentication and password protection systems, such as Steel-Belted Radius, Secure ID, and/or Telemate

Managed Backup Service

Background

Managing enterprise back up has become increasingly compounded due to a multitude of reasons. Shrinking backup window and strict SLA adherence in global environment, risk due to backup failures, growing compliance requirement, explosion in data growth and cost constraints mean that organizations face complex challenges in backup management services. Enterprises need a robust backup management service that enables reduction in risk exposure and adheres to stringent service levels while being a cost effective solution.

Solution

Biznet provides various additional services to its customers to fulfill their requirements on top of Biznet standard services. Biznet Backup Service is one of the additional services provided to customers, to answer the customers needs to have backup of their servers collocated or hosted in Biznet data center or the cloud server services that they subscribed.

We are experienced in installing, configuring and maintaining the following solutions:

  • Disk-to-Disk
  • Tape
  • NAS
  • Cloud

Backup Destination

The backup service provides 3 options:

  • From disk to disk
  • From disk to disk to tape
  • From disk to tape

Backup Retention

Biznet Backup Service will provide a standard 7, 14 or 30 days retention policy, which can be customized base on customer request.

Monitoring & Routine Tasks

24 x 7 x 365 remote backup management operations and monitoring.

Trouble Shooting & Permanent Remediation

ITIL based continual improvement.

Change Management

Perform multiple tasks like change requests, configuration management, addition, removal or decommissioning of backup client server.

Administration Planning

Maintain standardized document and SOPs.

Proactive Backup Management

Proactive focus on ensuring backup timeliness and completion.

Automation

Proprietary tools to improve backup management efficiency.

Real-time Reporting

Process Excellence
ITIL framework for continual improvement
Proven remote backup management process and methodologies.

Flexible Service Windows

Multiple options like 24X7, 8X5 remote backup management services, after-hours support, etc.

How do you benefit?

Growth in data complexity and storage requirements, along with the recent focus on corporate governance requirements, has forced many organizations to re-evaluate their data protection strategies. For many customers, the answer has been to outsource data protection altogether. The advantages of a service-based approach are:

  • Cost reduction
  • Maintaining focus on running the business
  • Gaining access to special expertise
  • Relieving resource constraints
  • Diminishing risk
  • Improving stability