Security | Data Protection Solutions | Aqueduct Technologies

Advanced Security

Aqueduct’s Advanced Security practice provides customers with the solutions needed to protect critical applications and infrastructure, no matter where they’re deployed.  We are passionate about helping organizations create comprehensive security programs that not only address immediate concerns but also establish a proactive approach to maintain resilience and ensure compliance.

 

We offer a variety of solutions to meet the needs of your organization:

Identity Management
  • Federated identity management
  • Single sign on
  • Cloud access security brokerage
Web & Email Security
  • Protect data, users, and applications
  • Web filtering and DNS Filtering
  • Anti-malware impersonation protection
Cloud Security
  • Cloud Access security brokerage
  • Host and network based security for AWS and Azure
  • Log management and correlation for AWS and Azure
  • Advanced monitoring and management with AWS cloud trail
Network Security
  • Rapid threat containment
  • Unified threat defense
  • Cognitive threat analytics
  • Application aware firewalls
  • Network segmentation
  • VPN
Security Awareness
  • User training
Network Access Control
  • User identity & device posture
  • Software defined perimeter
  • Campus, wireless, branch, machine-to-machine policy & enforcement
Behavioral Anomaly Detection
  • Network visibility
  • Event correlation
  • Network traffic deviation
  • Contextual awareness
Next-Gen End-Point Security
  • Anti malware
  • File integrity
  • Anti virus
  • Cloud proxy
Data Protection & Data Loss Prevention
  • Data discovery and classification
  • Data access protection
  • Data transit protection
Log Management
  • Log collection and parsing
  • Advanced reporting
  • SIEM
Next-Gen Firewalls
  • Application aware firewalls
  • Unified threat defense
  • VPN

Cyber Risk Program Maturity Self-Evaluation

Actionable insights and understanding of your program maturity

Assessment Services

ISE Assessment

Penetration Test

Vulnerability Assessment

Managed Security

Managed IDS

Managed Log Management

Managed WAF