fbpx Skip to main content

Managed Firewalls

PerimeterIQ

Cyber attacks are on the rise, and network boundaries are becoming ever more transparent. Next-generation firewalls (NGFW) offer a wide range of benefits for small businesses that want to stay safe in this digital age. Without an in-house dedicated security team, these solutions can be hard to implement and maintain on your own, so we created PerimeterIQ.

As managed firewall service providers, we created PerimeterIQ to fully manage firewall services built on the next generation of technology. We monitor your attack surface while ensuring your perimeter is secure and defending you from attackers.

Find Out MoreFind Out More
CSIQ-Managed-Cyber-Security-header-v2
csiq-background-breaking-squares-3
CSIQ-Perimeter-IQ

Who is PerimeterIQ for?

PerimeterIQ provides businesses with state-of-the-art security services, no matter the size. Our solutions help you prepare and defend against the latest cyber threats and reduce the administrative burden by providing everything in one managed service.

CSIQ’s security operations centre team proactively scans your network defences for indicators of compromise and vulnerabilities, strengthening your defences and detecting weak spots before cybercriminals can attack them.

Find Out moreFind Out more

Benefits of PerimeterIQ:

Simplified Management

We will ensure that your firewall solution is maintained and updated, giving you complete protection.

Value Driven Solutions

Your network perimeter will be secured without hiring and managing expensive security professionals in-house.

Holistic View of all Issues

All security issues are visible from our centralised risk management portal.

Indicators of Compromise

Our security operations centre proactively hunts for indicators of compromise (IOC’s) Any security issues identified are dynamically blocked.

Expedited Incident Response

In a security incident, our Cyber Security Incident Response team can use the firewall to quickly identify suspicious traffic and infected devices.

Expedited Hardware Fault Resolution

In the event of hardware failure, a replacement will typically be delivered and installed by an engineer the same day.

Integrated Security Stack

If the SOC team discover a suspicious device or endpoint within the network, it can be immediately isolated from the internet and other devices, ensuring that data is protected.

Features

  • Identifies applications in network traffic for deep inspection
  • Provides protection from malicious websites in both encrypted and non-encrypted traffic
  • Prevents unknown attacks
  • Threat protection performance and ultra-low latency
  • Industry-leading performance and protection for SSL encrypted traffic
  • High Throughput, support any WAN connection speed SSL Inspection, Intrusion Prevention and Threat Protection with minimal overhead (4microseconds)
  • Best of Breed SD-WAN capabilities to enable application steering using WAN path control for high quality of experience
  • Delivers advanced networking capabilities, high-performance and scalable IPSEC VPN capabilities to protect site to site traffic and remote workers.
  • Wireless 2.4 and 5 GHz (optional extra) supporting the WPA3 Personal and Enterprise standards

A USB 3G/4G router can be plugged into provide redundant WAN connectivity, ensuring continued internet access in the event of localised connection issues.

CSIQ are vendor agnostic and will recommend a firewall based on your organisation’s requirements. We only work with the leading Firewall vendors such as Fortinet, Palo Alto, Juniper, Checkpoint, Cisco & Meraki. All our vendors integrate with our monitoring systems and benefit from proactive firmware and remote management.

Your firewall will be monitored by our SOC team for indicators of compromise and maintained to ensure it is fully protecting your business with the latest features and security updates.

We are flexible in our approach and in how we inform you of security issues. We can call or email a point of contact or integrate with your existing monitoring solutions via SNMP and API’s. All risks and alerts are visible from our live risk management and ticketing systems.

Whenever firewall changes are requested, ITIL change management is utilised, ensuring that changes are conducted with the appropriate authority and are implemented securely, signed off by a technical specialist.

All consultancy and managed services come with access to our Risk Management Portal. All risk types, including technical, human, residual and inherent, are allocated a score, allowing for a strategic approach to risk reduction.

Monthly reports are provided detailing individual risk scores, a summary of events, detailed vulnerabilities, and security recommendations.

We will work with you to determine an effective vulnerability management strategy. The approach taken will depend on the technologies in use and line connection speeds. Our recommended approach will typically consist of weekly and daily scans.

Managed Firewall Lifecycle

Security Operations Centre

Our SOC team operate using our Managed Firewall Lifecyle to proactively monitor and respond to threats. Ensuring a timely and prioritised approach to risk reduction

CSIQ-Lifecycle-Background
1
Onboarding
2
Discovery & Baseline
3
Monitoring
4
Threat Detection & Prioritisation
5
Response
6
IOC Optimisation
7
Reporting

Flexible Pre-Pay Contract

With our Pre-Pay Contract, you can save 25% and receive rapid incident response.

CSIQ Insight: Risk Management Portal

All consultancy and managed services include access to our Risk Management Portal.

A Single Pane of Glass

All risk types, including technical, human, residual and inherent, are allocated a score, allowing for a strategic approach to risk reduction.

Monthly Reports

Monthly reports from our managed services detailing individual risk scores, a summary of events, detailed vulnerabilities, and security recommendations are all available from the platform.

Visual Attack Path

Multiple vulnerabilities are typically exploited to reach a target. Our platform visualises the attack path taken by your consultant to achieve the objective.

Trend Analysis

Track your exposure over time to ensure that your IT teams are tackling the vulnerabilities identified.

If you have our pre-pay contract, simply send us a message through the platform to assist with the remediation.

CSIQ-Footer-Logo-4

Managed Cyber Security

Services

To learn more about the other managed cyber security services we offer, visit our managed Email Security, Backup & BCDR, and Attack Surface pages.

Or get in touch to discover all our available services.

Contact UsContact Us

Our Accreditations & Memberships

We are proud of our industry recognised certifications in Cyber Security and Service Delivery

CSIQ NCSC Assured Service Provider Cyber Advisor
CSIQ NCSC Assured Service Provider Cyber Advisor
Cyber Essentials Plus Certification Body
Cyber Essentials Plus Certification Body
IASME Governance Certification Body
IASME Governance Certification Body
CSIQ IASME Cyber Baseline Certification Body
CSIQ IASME Cyber Baseline Certification Body
ISACA Professional Members
Ecologi - Climate Positive Workforce
Ecologi Climate Positive Workforce

FAQ

Why invest in a managed firewall?

Managing and protecting the network perimeter requires specialist skills. A simple misconfiguration can expose your network to exploitation and opportunistic hackers. A change management process and proactive monitoring are essential to protect your critical infrastructure.

What firewall will you provide?

No one firewall solution fits all vendors. A CSIQ consultant will analyse your requirements and recommend a strategic solution that meets your current and future needs.

What firewalls do you support?

We are vendor agnostic and support all major firewall vendors such as Cisco, Checkpoint, Juniper, Palo Alto, Meraki, Fortinet, pfSense, and Watchguard.

Can I pay monthly?

We can provide next-gen managed firewall solutions for SMEs on a pay-monthly service. Spread the cost of the hardware over the course of the agreement and benefit from change control, proactive monitoring and threat hunting without upfront capital expenditure.

Have a question for us about our services?

Send us an enquiry to get a rapid response from a cybersecurity expert.

"*" indicates required fields

Name*
Hidden
Hidden
This field is for validation purposes and should be left unchanged.