
Identity Access Management
Centralized AD/SSH Management, User, Group Access management – Joiner, Mover, Leaver, Segregation of Duties (SoD)

Antimalware
Configuration, Monitoring, Update, Periodic Scanning of anti-malware, signature update etc.

Host IDS/IPS, Firewall
Configuration, Monitoring, Signature Update of Host IDS/IPS etc.

File Integrity, OS Log Monitoring
Configuring, Monitoring of Security OS Log Events & periodic File Integrity monitoring