https://store-images.s-microsoft.com/image/apps.39978.020ef3b5-ae20-494f-b236-e9c0783097f5.7d6d10f9-5689-43fb-ad9a-bf267ede2620.dc57d9cc-d618-4cf8-b77e-02ad32d72649

Liquid Fortinet Firewall as a Service (FWaaS)

Liquid Telecommunications Operations Limited

Liquid Fortinet Firewall as a Service (FWaaS)

Liquid Telecommunications Operations Limited

A Managed Security and UTM solutions that is fully maintained and supported by IT security experts

Unified Threat Management (UTM) is an approach to information security where a single hardware or software installation provides multiple security functions.

Key UTM-related threats

  • Unauthorized Access - Unauthorized access by users or devices, e.g., remote endpoints
  • Unauthorized use of network protocols, services, applications and IPS- Misuse and compromise via vulnerable or weakly configured network protocols, services IPS and applications.
  • Malicious code and malware attacks, including phishing- Virus attacks, compromise via malicious code website, phishing in all its forms.
  • Hacker reconnaissance exploits and penetration – Hacker attacks on public-facing infrastructure aimed at gaining access to private network assets.
  • Intrusion and Brute Force - Intrusion attempts in all its forms including brute force attacks on user credentials.
  • Denial of service (DOS) and Data interception – Interception of sensitive information including user passwords.

The Liquid C2 solution

  • Multi-tenant or dedicated options – Liquid-owned MSSP offering consisting of virtual UTM per customer or dedicated devices owned by the customer
  • Multi-tenant options – Cisco and Fortinet
  • Dedicated options – Cisco, Fortinet, Palo Alto, Check Point
  • Solution module options - by Next-generation firewall (NGFW), next-generation IPS, (NGIPS), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust
  • Consolidated Management and Reporting – Ease of management and relevant reporting to stakeholders
  • Event Logging and Storage – Linked to requirements and service level agreements

Monitoring and Analysis Service options - Monitoring and analysis requirements linked to service level agreement (SLA)

Liquid C2 options

  • Demonstration and Proof of Value (POV) - Demonstration and or trial of the solution
  • Enabling Product Solution – Annual per user subscription license, perpetual and customer-owned, multitenant via LIT MSSP licensing
  • Product Solution + Professional Services - Liquid to deploy the solution based on an agreed scope of work (SOW)
  • Monthly LIT Support - Liquid to assist with customer support requests
  • Managed Security Services (MSS) - Liquid to provide day-to-day management, monitoring, analysis, reporting, as well as incident management and response. All to be aligned to Service Level Agreement (SLA).

https://store-images.s-microsoft.com/image/apps.52472.020ef3b5-ae20-494f-b236-e9c0783097f5.7f501cac-a0ac-48d8-a364-f6e74aa2da88.4f275707-a568-47d7-ad7f-5f9be40060e1
https://store-images.s-microsoft.com/image/apps.52472.020ef3b5-ae20-494f-b236-e9c0783097f5.7f501cac-a0ac-48d8-a364-f6e74aa2da88.4f275707-a568-47d7-ad7f-5f9be40060e1