Bridge Point consultants provide security infrastructure design and implementation services across the whole range of security solutions. Bridge Point partners with Check Point, Cisco, Blue Coat, F5, RSA and Crossbeam to provide these solutions.
Security Infrastructure Projects
Security Infrastructure covers perimeter based security such as firewalls, IDS/IPS, dedicated appliances and Content Filtering. Bridge Point provides a mix of product as well as architectural design and implementation services based on projects. The security infrastructure preferred vendors are Check Point, Crossbeam, Blue Coat and RSA.
Data Loss Prevention
Bridge Point provides consulting and implements solutions to help mitigate the risk of data loss from your organisation. An initial baseline is taken to determine the current level of exposure and then recommendations are presented based on the results. This includes the implementation of DLP solutions at the endpoint, gateway and network layers.
Security Information and Event Management (SIEM)
Bridge Point provides solutions to enable the correlation of logs from disparate security and network devices and develops rules to ensure the correlation triggers meaningful events
Managed Security Services
Bridge Point provides Managed Security Services to our clients, from simple monitoring and alerting to a fully outsourced model including the management of your entire security infrastructure. Through this service, Bridge Point also offers secure email and clean pipe solutions.
Remote Access Projects
Remote access is driving the requirement for endpoint security. Endpoint security is now front of mind with organisations and includes all facets of securing remote devices such as Disk and Media encryption and DLP strategies. Bridge Point secures endpoint devices using Check Point's Total Security product suite or F5's FirePass product. RSA provides technologies around two-factor authentication and certificates for Public Key Infrastructure.
Vulnerability and Penetration Testing
A Bridge Point consultant will assess an organisation's application, host or perimeter security including firewalls, routers, gateways and service providers to determine its susceptibility to external threats such as malicious attack from hackers.