Keep access to your infrastructure secure by putting our security professionals to work for you through our Managed Intrusion Prevention Systems (IPS) Service. Our team proactively manages and monitors your IPS appliances, watching your infrastructure 24 x7 for unwanted or malicious activity, such as:

Device Health & Performance Monitoring

We monitor IPS appliances for device up/down status; last event/alert activity, system parameters; interface availability; and fail-over status. Please note that specific monitoring may vary slightly by vendor and technology.

Change & Configuration Management

Our security professions remotely execute your authorized changes according to the type of change from our security operations center. Passive signatures (those with no automatic response) are considered standard changes (preauthorized). We back up and maintain configurations in case they are needed.

Signature and Anomaly Detection Development & Deployment

We design and deploy signatures supporting behavioral, trend and anomaly-based analyses to identify threats that have no true “signature.” We accomplish these efforts by working with early warning and intelligence information received through cooperative efforts with global computer emergency response organizations.

Release Management We maintain your appliance to the release that best services you. We review and test routine updates from manufacturers and implement only updates that add beneficial functionality or resolve specific “bugs.” We immediately attend to security updates after your authorization to proceed outside of a normal change review cycle.

Incident Management & Threat Mitigation (Requires Firewall Service)

Our analysts scan for intrusion events 24x7 and investigate suspect incidents. Should an incident be detected, the security analyst opens a ticket and processes the incident based on impact priority. The incident level may be raised or lowered based on further investigation. We activate immediate threat mitigation response, based on review and preauthorization by your change advisory board. We recommend establishing initial baselines to identify important business applications and avoid unintentional disruptions.

Policy Review (annual)

We collaboratively conduct an annual formal policy review to ensure your existing policy is secure and configured for performance. We request and conduct any findings via the approved Change Management process.

Policy Optimization (continual)

We continually review all requested policy changes to ensure adherence with best practices and to avoid negative impact to device performance and business operations.
Get A Quote
Security Consulting and Compliance
Name:
City , State / Zip Code:
​E-Mail:
​Customer Type:
​How Did You Find Us:
​Comments:
DDenial of Service (DoS) attacks, malware and intrusions. We vigilantly track the log and alert records produced by this specialized security equipment —correlating and investigating events of interest whether the device is installed in passive detection mode or configured for active response.enial of Service (DoS) attacks, malware and intrusions. We vigilantly track the log and alert records produced by this specialized security equipment —correlating and investigating events of interest whether the device is installed in passive detection mode or configured for active response.
Your security technology is remotely monitored and managed by our toolset and you have complete transparency into current status, investigative efforts and historical records through our Portal. We perform these activities to protect your IT infrastructure:

Fredericksburg, VA,  22405 /  (800) 630-4191 /  contact@parscomputing.com
Copyright  © 2011, PARS Computing llc,  All Rights Reserved.
Service Support
Corporate Info
Get Connected
Professional Services
Security
Administration
Database Configuration
Data Backup
Hardware/Software

Residential Services
Device Manufacturer Escalation

You have a single point of contact as we escalate any technical issues to the vendor and maintain ownership of the issue through final resolution.

Standard/Custom Compliance Reporting

Through our service, we capture and process event logs to produce several standard reports that include: Top 20 Source and Destination IP of events of interest, Top Alerts by priority, Raw events and details and incident reports