Security Services

Our core expertise focuses on the design and implementation of large-scale networks that requires advanced technical skills.

Security Operations Center

Security Operations Center

Security-as-a-service involves organizations leveraging third-party consultants and managed security service providers (MSSPs) to monitor the security of their infrastructure. Whether it is the need for log management, threat detection, SIEM-as-a-service, or compliance, many are choosing to outsource this service versus building the capability internally. Cost savings and overcoming staffing and skills gaps are motivating factors for outsourcing day-to-day security functions.

Managed SIEM – Log Management and Operation Intelligence

Managed SIEM

X10 Technologies is a security-as-a-service provider leveraging the power of award-winning AlienVault Unified Security Management™ (USM™) platform for security monitoring (asset discovery, vulnerability assessment, intrusion detection, behavioural monitoring, and SIEM log management and correlation.). The all-in-one AlienVault USM platform delivers essential security controls and seamlessly integrates real-time threat intelligence from AlienVault Open Threat Exchange™ and the AlienVault Labs team to quickly identify threats affecting your network and prioritize actionable response, within minutes of deployment.

Top 5 Reasons To Choose A Certified Alienvault Mssp For Security-as-a-service

Security-as-a-service from X10 Technologies, service offering includes:

Firewall Management – Firewall Policy Administration, Management and Troubleshooting

Firewall Management

Whether it be hardware devices, a virtual platform, or a cloud firewall. Our 24/7 operations monitor device states and alerts in real-time and will record the event by creating an incident. Our monitoring tools provide a real-time view and reporting of the device state. Our technical team not only keeps track of your up-time and down-time but also validates and determines the causes of the issue for each event. We are continuously monitoring system resources and the performance of systems and networking devices.

X10 Technologies specializes in providing Managed Firewall Services leveraging over a decade of experience in managing security policies and operations across various technology platforms.

Today, we help companies of all sizes successfully leverage their technology investments.

Our Network and Security Operations Center support team provide turn-key operations and 24/7 monitoring and notification services. X10 Technologies understands the importance of specific and critical devices to be monitored in order to reduce the risk of non-compliance and increase corporate security posture.

X10 Technologies will ensure that the proper elements and commitments are in place to provide consistent IT service support and delivery to hour organization. X10 Technologies will act as a primary support contact and will troubleshoot and provide resolution to production and non-production systems. X10 Technologies’ designated resources will also be tasked with preventative work in order to reduce incidents as much as possible.

Our managed firewall services include:

Monitoring Tasks

X10 Technologies will work to define a set of operational procedures and will execute the tasks as per defined schedule. We will proactively monitor systems and applications to prevent any identified issues that will have an impact on your company’s day to day operations.

Analysis and Response

X10 Technologies will work with internal resources and external vendors to address any specific system/network/application issues that pertain to production and non-production environments.

Operational Tasks

X10 Technologies will assist with system/device updates and patching of production and non-production firewall devices.

Regular schedule will be determined based on existing requirements and policies in place. If not in place, X10 Technologies will prepare a schedule that may include after business hour tasks (automated and/or manual, scheduled and/or on demand).

Note: Updates and patching may require outages. Details of the outage will be communicated with business and get prior approval.

IT Asset Lifecycle Management

X10 Technologies will work to define a set of operational procedures and will execute the tasks as per defined schedule to perform the following tasks:

Help-Desk Operations

X10 Technologies provides a 24/7 help-desk operation and monitoring service. The service is fully managed and hosted by X10 Technologies. Our agents cover a full 24/7 shift with an additional fail-over option to a call-center. This ensures highly available customer support operations.

X10 Technologies will provide scheduled reports as requested and agreed during the on-boarding process.

Vulnerability Assessment

Vulnerability Assessment

The overall objective of the engagement is to test, investigate, analyze, and report on the level of risk associated with any security vulnerabilities discovered during the assessment. The goal is to provide your organization with appropriate mitigation strategies to address those discovered vulnerabilities. The Risk-Based Security Vulnerability Assessment methodology has been designed to comprehensively identify, classify and analyze known vulnerabilities in order to recommend the right mitigation actions to resolve the security vulnerabilities discovered.

As a part of this engagement, X10 Technologies will deliver on the following services:

Penetration Testing

Penetration Testing

Enumeration involves active connections to the systems and direct queries. Some additional operations and techniques used include:

For identified systems, X10 Technologies will provide a port to service level mappings for TCP and UDP as a component of reporting. As port-scanning results will be integral to identifying hosted applications, services indicative of applications will be catalogued and used to create an inventory of applications included in later assessment phases.

Using the information gathered during the testing (e.g., operating system versions, applications, and open services), the X10 Technologies team will perform research on the vulnerabilities that may affect the specific target systems. The team will then attempt to confirm if these vulnerabilities actually exist on the system.

Governance and Compliance

Governance and Compliance

Security Governance / Operations Review

This phase will leverage information gathered initially to perform a detailed assessment against industry best practices, taking into account your considerations.

At a high-level, the security operations review consists of:

A. Review of documented policies and procedures:

B. Analyze information gathered via interviews, including practices related to:

C. Assess the current implementation of controls across all control categories of listed here:

D. Using standard capability maturity model, assign existing security practices a maturity level ranging from 0 (Non-existing) to 5 (Optimized).