Identity Access Management
Centralized AD/SSH Management, User, Group Access management – Joiner, Mover, Leaver, Segregation of Duties (SoD)
Configuration, Monitoring, Update, Periodic Scanning of anti-malware, signature update etc.
Host IDS/IPS, Firewall
Configuration, Monitoring, Signature Update of Host IDS/IPS etc.
File Integrity, OS Log Monitoring
Configuring, Monitoring of Security OS Log Events & periodic File Integrity monitoring