Echo SP South Africa - Security

Security services form the cornerstone of a well-designed and managed network. As an MSSP we can prevent, detect, and respond to threats before they wreak havoc with your data.

The internet, traditionally built to be open and shared, comes with its fair share of security concerns. An estimated 85% of all mail is junk or spam, and phishing attacks are a daily occurrence.

Operating systems and networks are a focus point for breach, and the smallest unnoticed vulnerability may be all it takes for your network and data security to be violated. 

Security services including firewalling, IPS (intrusion prevention systems), anti-virus and anti-spam, URL filtering, encryption and authentication all become standard requirements that we will install, monitor and support.


Managed Firewalls

Fortinet is the market leader for network firewall technology. Their FortiGate devices deliver complete content and network protection by combining stateful inspection with a comprehensive suite of powerful security features that include perimeter, LAN, data centre, security operations and mobile/ remote access solutions. 

Our engineers, who are Fortinet trained and qualified up to NSE7, will implement changes and provide reporting on your security posture, from basic health checks to monthly reporting and management. Our security team is assisted by automated systems that constantly monitor and manage your security requirements.

Governance & Compliance

Many organisations spend a fortune on security controls that are not optimally configured and/or not regularly checked, which decreases their effectiveness. Our automated governance and compliance validations run weekly and provide alerts where there is a change to critical policies that can result in potential vulnerabilities. 

These validations are executed against various frameworks, including the National Institute for Security Technology (NIST) and the Payment Card Industry (PCI) standard. In addition, the platform uses the vendor’s best practice configurations to provide compliance scores and remediation guidance, giving you peace of mind that the correct measures are in place.

Security & Vulnerability Trends

Cyber threats show accelerated growth year on year and have become a key risk in every business, with attacks such as ransomware, receiving much media attention. Cyber criminals target organisations of any size from all industry segments including the post-pandemic, work-from-anywhere groups. 

We have a holistic view into security and the entire threat landscape, offering a host of solutions that not only protect you from an attack, but will also assist you to recover with minimal damage. 

Security Risk Assessments

Sometimes the best line of defence is to imitate an attack. By checking vulnerabilities and loopholes that could be exploited by threat actors, you have a pre-emptive approach to your security posture. 

Let Echo help you find these loopholes in a proactive way. 

Compliance Dashboard

We can deliver a dashboard which displays your firewalls according to levels of compliance, aligned to FortiGate best practice, PCI and NIST standards. The firewalls are displayed in red when there are non-compliances flagged, and green when they are suitably compliant. 

This tool allows all parties to better manage the configurations of each firewall and to ensure that these standards are continuously being met. In partnership with Port443, we can provide playbooks with pre-developed automation and remediation processes.

SOAR as a Service

Security Orchestration, Automation, and Response (SOAR) includes the following: 

Compliance Monitoring: regular configuration checks and other routine tasks are automated and reported on periodically, or at pre-determined thresholds. Firewall configurations are checked according to levels of compliance, aligned to vendor (FortiGate) best practice, PCI and NIST standards.

Playbook as a Service: a custom playbook per client is defined, making use of the SOAR pre-built integrations. These playbooks are developed and maintained to automate mundane, yet critical, security maintenance and event responses.

OneView Dashboard: your customised OneView Dashboard is used to present all the compliance outputs and playbooks, along with specific relevant information from your security estate, for a rapid and constant view.