Alagen | Technology Solutions & Strategy
18
page,page-id-18,page-template-default,,qode-child-theme-ver-1.0.0,qode-theme-ver-9.4.1,wpb-js-composer js-comp-ver-4.12,vc_responsive
 

Technology Solutions & Strategy

Choosing the right technology to meet the security needs of your organization is critical in today’s environment. As important is ensuring that your organization has a strategy that includes the appropriate resources and processes necessary to realize a return on investment on that technology.

Alagen’s security professionals assess business needs to develop an architecture that incorporates appropriate technology at the right cost and performance levels, including:

  • Technology Architecture Review / Strategy / Development
  • Security Device Optimization & Hardening
  • Solution Implementation
  • Security Operations Review

Technology Architecture Review / Strategy / Development

The modern enterprise is a heterogeneous, ever-expanding environment. Every enterprise is different, and each industry has its own set of requirements and direction. Alagen consultants understand the threat and regulatory landscape and can help enterprises evaluate the capability of their infrastructure to protect critical business assets. Alagen brings expertise in the form of consultants who have spent decades in the information security space, across a variety of industries.

Regular review of an organization’s security technology footprint and security posture is critical to staying current with changing threat landscape and business requirements. Our team of experts can:

  • Evaluate current security architecture and operational practices to ensure that the necessary infrastructure and processes exist to defend your company’s assets
  • Identify opportunities to increase effectiveness of defense, visibility, and response mechanisms and processes
  • Align technology investments with best practices

Security Device Optimization and Hardening

Within the domain of information security, point devices exist specifically to provide functionality, visibility or countermeasures.  Information Security teams become operationally responsible to monitor changes in governance guidelines and standards to ensure these devices remain relevant and useful in providing enterprise security.

  • Ensure security infrastructure is optimized and hardened
  • Uncover security holes or unused rules
  • Identify the use of risky protocols in your environment

Solution Implementation

Alagen maintains a pool of talented engineers that can assist a company in every phase of a solution’s lifecycle.  The Alagen team traditionally follows the RPDIO model (Review, Plan, Design, Implement, and Operate), but can accommodate any solution lifecycle required. Our enterprise customers have exceptionally talented security professionals, however they often lack the capacity and technology exposure to accomplish complex plans. In these circumstances, Alagen’s engineers can be leveraged by companies to bring plans to reality. The Alagen team has experience on a variety of solutions from commercial high end solutions targeting the Fortune 100 enterprise, down to open source solutions that are targeted to the average corporation.

Security Operations Review

One of the three major components of a successful IT environment (People, Process, and Technology) is Process. Alagen consultants provide external reviews of our client’s Policies, Processes, and Controls against industry standards and best practices as well as to ensure those processes are appropriately tailored to support your business. Alagen looks at the entire security ecosystem to find what processes will work best for your environment.

Supported Technologies

  • Cisco ASA
  • Palo Alto Networks
  • Checkpoint
  • Juniper Networks
  • McAfee
  • SourceFire

  • Cisco ISE
  • F5 (APM)
  • Microsoft Forefront Identity Manager
  • Cisco Secure Access Control Server (ACS)

  • Rapid 7
  • Qualys
  • Nessus
  • Kali Linux toolset

  • Cisco WSA
  • Palo Alto Networks
  • Blue Coat
  • Web Sense

  • FireAMP – SourceFire
  • FireEye
  • Lancope
  • Arbor Networks