About Us | Contact Us
View Cart

By Vigilize | Sunday, January 1, 2012 - Leave a Comment


Having made the decision to “outsource” or to “get more professional help,” the next decision you need to make is this:  Are you really willing to hand over the important monitoring function to a cookie-cutter approach?  When you do your homework, you will find that infotex has the appropriate controls in place to provide top-notch service: including third-party assurance controls, certifications, training, and testing.  Why be one of thousands, when you can have a custom approach?


SIEM


Security Information and Event Management

An important part of our network monitoring systems is the role that our SIEM technologies play in gathering security data from all critical assets.  The ability to correlate network traffic analysis to event logs on-demand allows a holistic understanding of events in real time.  Still, we question the value of requiring non-security personnel to retrieve their own information (and decipher the results) from complex on-demand portals.  We know you’re wearing many hats and thus we believe one reason you’re hiring us is because we push information to you, rather than making you remember to go out to our portal and pull it down.

Human Reporting

To us, the biggest myth in Information Security is that you can automate information security.  Sure, some parts of the process are automated. But human beings still need to monitor the automated processes, and that’s exactly what separates infotex from other vendors. Not only do we customize our approach to your organization’s needs, not only do humans watch your network, but we do not make you pull information from our system. Instead, we’re big on pushing out the information you need, when you need it. We sort through all the noise, and only involve you when you need to be involved.

Multiple Methodologies
We customize our approach to your unique needs, not only in our reporting and response “decision tree,” but also in how we connect to your network. Our Intrusion Prevention Service can be in-line, utilize Dynamic ACL updating, or leverage a LAN Bypass function so that the sensor is not a single point of failure.

Decision Tree / Calling Tree
Our Decision Tree / Calling Tree is a matrix listing all the predictable security incidents and your customized instructions as to the appropriate response. This includes a “first choice” to a “last resort” response. It can get as granular as you wish.

Latest News
     A Timeline Update as of 02/22/21 An update to our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We have decided to leave the original article as it was originally posted and to update this post with any changes that have been made. You can see […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    A Webinar-Movie The 2020 annual webinar update on the subject will include a review of the previous years’ movies that are already available, and a discussion about alternative tactics that have arisen from recent virtual conferences and regulator panels.
    The cybersecurity industry faces challenges, and some of them may involve your business… An article review. In a world where threats to your organization’s electronic assets are constantly emerging and evolving a cybersecurity insurance policy can help mitigate risk…but what kind of risk does the cybersecurity insurance industry face?  A new article in the Harvard […]
    What are the top seven risks your board should know about in 2021? Since his first board presentation in 2000, when Dan presents audit reports to boards of directors, he also talks to the board about the top risks the institution is facing. Since 2006, Dan has been compiling a list of the “top seven […]
    A Timeline as of 01/24/2021 Our Newest Employee’s FIRST Technical Article Another interim post-mortem review . . . . A Note About Updates: We are leaving this article as is, but for any updates to the timeline, check the Autopsy of the SolarWinds Hack Timeline Update article!      – Vigilize Introduction: As the managing […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS FORUM AND CONFERENCE NEWS infotex is proud to announce that Dan Hadaway will be moderating a series of IT Forums for the Ohio Bankers League. “We are excited to continue fostering the relationship with the OBL to help educate and keep Risk Management at the forefront of […]
    Top 7 Trend Articles of 2021. . .  . . .For ISOs of Small Financial Institutions. Welcome to our annual T7 article:  a list of our favorite trend articles from the past year.  Our intent: help you organize your thoughts as your work through your strategic planning process.  We hope reviewing these articles will help you […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]