Managing and maintaining a network is challenging; but with Endeavor Services Group, it doesn’t have to be!
Service Overview
- Offers 24/7/365 monitoring and protection services from the latest vulnerabilities.
- Increases productivity by preventing access to web content prohibited by company policy.
- Improves network performance by blocking data from non-approved sites, applications and content.
Network Hardware Supported
- Firewall
- Switches
- Routers
- Wireless Access Points (WAP)
Standard Service Level
- Unlimited policy changes per month
- Policy management
- 24/7/365 performance monitoring and alerting
- Web content and URL filtering (whitelist and blacklist)
- Application control
- Customized content filtering
- Intrusion Prevention Service (IPS)
- Anti-virus, anti-malware, anti-spying via scanning of data streams
Feature Overview
Feature: | Description: |
---|---|
Firewall with Stateful Inspection | A firewall blocks attacks by inspecting traffic, keeping track of valid sessions across the network, and filtering traffic that looks suspect so that it cannot pass into the network. |
Number of Sites | A site can be a company location or it can be services located within a data center. |
Configuration Backup & Restore | The configuration of your security device is backed up, so that in the event of hardware failure, the original configuration can be restored to a new device. |
URL Filtering | URL filtering uses a method called whitelist and blacklist for filtering. A whitelist is a list of URLs that are allowed. A blacklist is a list of URLs that are denied. |
Content Filtering | Allows you to choose categories of websites to block at the firewall. |
Intrusion Prevention System (IPS) | IPS monitors network and/or system activities for malicious activities or policy violations and reports them, but does not stop them. |
Antivirus / Malware / Spyware | Antivirus is used to prevent, detect and remove malware. Malware is software designed to secretly access a computer system without the owner’s consent. Spyware is a type of malware that can be installed on computers to collect small pieces of information about users without their knowledge. |
Application Control | Uses dynamic application identification engines that recognize applications based on their behavior. By coupling application control policies with sophisticated security features, you can achieve a more granular level of security at the individual application level or by managing categories of applications. |
Reporting | Scheduled report for reporting to include IPS, antivirus, anti-malware, anti-spyware, and content filtering. |
Site-to-Site VPN | Site-to-Site VPN |
Options
SKU: | Includes: | Monthly price per firewall/security appliance: |
---|---|---|
MS-MMN-STANDARD | Unlimited policy changes per month, Policy management, 24/7/365 performance monitoring and alerting, Web content and URL filtering (whitelist and blacklist), Application control, Customized content filtering, Intrusion Prevention Service (IPS), Anti-virus, anti-malware, anti-spying via scanning of data streams | 125.00 |
MS-MMN-PLUS-L1 | All the services in STANDARD. Plus, usage of Meraki security appliance with advanced security license. (up to 50 connections) {Requires a min. 24-month agreement} | 325.00 |
MS-MMN-PLUS-L2 | All the services in STANDARD. Plus, usage of Meraki security appliance with advanced security license. (Up to 200 Connections) {Requires a min. 24-month agreement} | 400.00 |
MS-MMN-PLUS-L3 | All the services in STANDARD. Plus, usage of Meraki security appliance with advanced security license. (Up to 500 Connections) {Requires a min. 24-month agreement} | 750.00 |