Unified Threat Management

Unified Threat Management

Fusion’s UTM is identity based, not location or physical topology. Deployment requires no changes to the user environment and the service can operate over existing customer equipment, providing the same level of data segmentation and security across all network types.

Main benefits include:

  • Unprecedented security and value
  • Highest security performance: Designed for the Department of Defense; NSA-certified
  • Facilitates HIPAA compliance rules for data encryption
  • Protects PHI and other sensitive data across the hospital campus
  • Identity-based management; creates Communities of Interest, based on user credentials and not device location or physical topology
  • Secures off-site data access
  • Avoids the cost of data breaches
  • Easy, quick deployment
  • Incremental implementation
  • No application changes
  • Efficiencies in network infrastructure saves capital and operating expenses

Comprehensive Security Solutions

  • Managed security services
  • Managed firewalls
  • IPS services
  • Application firewalls
  • Content scanning
  • Email and web scanning

Identity and Access Management

  • Facilitated access management
  • Automated authentication
  • IDs managed across multiple systems
  • SSL Certificates
  • Credential issuance service
  • Enterprise Identity Services
  • Web access management

Response and Analytics

  • IDS services
  • Rapid response service
  • Security operations
  • Threat and vulnerability assessments
  • Log aggregation
  • Digital forensics

Risk and Compliance

  • Integrated risk and compliance solutions
  • Security management
  • PCI compliance
  • Vulnerability Management
  • Application vulnerability scanning

Secure Mobile Device Management

Fusion has responded to the burgeoning growth in mobile device type and usage with a best-in-class solution that manages mobile devices across multiple platforms, including iOS, Blackberry and Windows mobile platforms.  Offering a real time view of all mobile devices deployed across an enterprise, the solution manages the complete lifecycle of mobile assets, streamlining device deployments, enrollments and configurations by centrally tracking, monitoring and modifying mobile assets. Fusion’s solutions have been customized and developed with a focus on securing the data moving across the devices, integrating the solutions with our Unified Threat Management Solution, while at the same time managing access across locations, roles and functions.