Matrix has facilities, people, technology and processes certified in the best international practices to ensure the highest level of safety for our customers' environments. In addition to the best practices adopted by Matrix for managing information security in its infrastructure, it is the customer's responsibility to use the best security practices for its applications. The level of security sophistication of the customer's environment is related to the infrastructure characteristics and optional security mechanisms contracted in the Commercial Proposal.
Anti-DDoS and Anti Spoofing
All network traffic entering the Data Center, through the Internet Access Band, is inspected in real time, to mitigate attacks. This service does not include inspection for the customer's private telecommunications channels. If the customer wishes to inspect their private telecommunications channels, they will be subject to an additional charge, according to the Commercial Proposal. Further details can be found in Connectivity and Internet Access Bandwidth.
Solution for controlling and establishing rules for accessing the customer's environment through the local or long-distance network (LAN/WAN). Firewalls are available either physically or virtually.
The customer will operate and manage their Dedicated Firewall, or choose to hire Matrix firewall management services. For both cases, the customer is responsible for defining the security policies implemented in the firewall.
In the case of hiring management services, 8 (eight) technical hours or 5 (five) calls during the month to request customer configurations are included.
Firewall as a Service
Firewall as a Service is a cloud-based solution that delivers advanced security features in customer environments at an excellent cost-benefit ratio. The solution is offered using open source or licensed technology. For both cases, the customer has support and SLA from Matrix:
Scope of ServicesManaging information security environments can be an onerous task. The customer may choose to outsource these operations by contracting firewall management through Matrix. In this case, Matrix will be responsible for:
- Personalized advice to help you select the right firewall solution for your needs
- Custom configuration to install and manage firewall systems according to your policies
- Provisioning, deployment and integration of devices with existing system, location and networks
- Seamless device management, updates and patch management with unlimited policy changes
- Real-time health and safety event monitoring with fast escalation
- Periodic firewall activity reports
- Extensive support for NextGen context, UTM content and other important features
- Added support for high availability, site-to-site and client VPNs, and virtual contexts
It is a PAM software service, optional security mechanism applicable for Enterprise Hosting and Cloud Computing services. PAM is a privileged access control platform (privilege access management) that stores, manages and monitors all credentials such as passwords, SSH keys and digital certificates in a digital vault.
Through the use of encryption mechanisms, the password vault offers users the possibility of using a password just to access a series of credentials registered in the solution. In addition, it is possible to access all network resources through SSH and RDP protocols, storing all records of their use for auditing and compliance analysis purposes. Allows real-time analysis of actions taken by users and the generation of alerts to identify fraud or improper actions.
The malware host protection solution is included for all Enterprise Hosting and Cloud Computing customers that rely on Matrix management services. Customers who choose to manage their environment can contract Anti Virus licenses, charged per deployed host, as per the Commercial Proposal.
Protection for servers and virtual environments, with cloud-based management includes: