No one needs to tell you why you need network security. You wouldn’t be in this game, if you weren’t aware of the dynamic threat that looms perpetually on the horizon. The difficulty is sifting through the barrage of information and distilling it into a workable security plan for your business.

Intelys is a highly skilled, experienced partner who spends time understanding your business and can help you to design and implement security solutions that evolve with how your needs interact with the technological landscape. These solutions provide considered protection of your organisation’s assets, put you in a better position to respond to attacks and allow options for contingency and business continuity.

Intelys is passionate about network security. We are informed, certified and constantly up-skilling in this pervasive field so that our expert team can fortify your network foundation, protect your critical assets and allow for safeguarding from threats in the complex online environment. While we have extensive experience in enterprise network security, we are also driven to make global best practice solutions and products available to medium size businesses who have just as pressing a need to protect their business assets.


Our ONESecurity solutions provide control, visibility and insights that are needed to defend your business imperative functions, applications and assets. These approaches are multi-layered, allowing flexibility for growth and improvement as technology develops.

  • Unified Cloud Portal (Intelys SIEM platform provides organizations of all sizes with a comprehensive, holistic, and scalable management platform for security, performance, and compliance management, from IoT to the cloud.);
  • Secure SD-WAN (Secure Software Defined WAN can provide an intelligent overlay network to your existing WAN, and in some cases replaces infrastructure such as MPLS);
  • Enterprise Firewall (Next-Generation Firewall, IPS/IDS, Internal Firewall Segmentation);
  • Advanced Threat Protection (Web Application Firewall, Sandboxing, Secure Email Gateway, and Endpoint Security);
  • DD0S Protection
  • Internal Machine Learning Intelligence with Dark Trace.

Intelys security infrastructure is delivered as a single security platform and is built using best of breed vendor architecture. Intelys partner only with Gartner top quadrant product houses, such as Fortinet, Cisco, Juniper, and Citrix.

Enterprise Firewall

Cybercriminals continue to launch automated and sophisticated attacks against organizations, threatening the foundation of cloud and digital transformation critical to efficient business operations.

Read More

Next Generation Firewall

Our  next-generation firewalls (NGFWs) provide high performance, multilayered validated security and granular visibility for end-to-end protection across the entire enterprise network. Our purpose-built security processors (SPUs) deliver scalable performance and ultra-low latency for advanced security capabilities. Our security services provide continuous threat intelligence updates and automated mitigation to keep organizations protected from advanced cyberattacks.

Our NGFWs reduce complexity and lower the total cost of ownership along with supporting scalable deployments at the network edge, data center, internal segments, and distributed branches.


The enterprise data center is evolving rapidly, incorporating technologies such as virtualization, software-defined networking, public cloud computing, along with advanced cyber security. Trying to apply traditional security solutions to these sorts of new technologies generally will not be effective. Enterprises need to evaluate their data center initiatives and how they will impact network security to ensure all areas of the data center remain protected.

In today’s dynamic and complex data centers, security must be flexible, effective, and easy to manage. It needs to bring order to the chaos—not add to it. Intelys can protect your physical, virtual, and cloud servers with one solution—whether it’s for data center, private cloud, or public cloud deployments.

Internal Segmentation Firewall

With advanced threats growing rapidly in number and sophistication, perimeter security is no longer enough to keep your sensitive information safe. Once a threat gains entry, it can spread and eventually extract the valuable assets it was sent to retrieve.

You can dramatically improve your security by adding Internal Network Segmentation Firewalls to your network to prevent the proliferation of threats once they get inside. ISFWs provide network segmentation inside the perimeter. They may sit in front of specific servers that contain valuable intellectual property or a set of user devices or web applications sitting in the cloud.

Advanced Threat Protection

Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types.

Read More

Web Application Firewall

Our multi-layered and correlated approach protects your web apps from the OWASP Top 10 and more. Our Web Application Security Service uses information based on the latest application vulnerabilities, bots, suspicious URL and data patterns, and specialized heuristic detection engines to keep your applications safe from:

  • Sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, and cookie poisoning
  • Malicious sources
  • DoS attacks

It also includes layer 7 load balancing and accelerated SSL offloading for more efficient application delivery.


Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It’s also a key component of our Advanced Threat Protection solution.

Secure Email Gateway

According to analysts, email security solutions from multi-product vendors have lagged behind changes in the threat landscape and email threats bypass traditional threat prevention technologies.  As a result, they recommend assessing the advanced threat defense capabilities of incumbent email security solutions, supplementing them or replacing them to fill gaps.

In fact, according to Verizon’s 2017 Data Breach Investigations Report, two-thirds of all malware leading to security incidents are initially delivered via email.  That’s why you need the powerful protection of Intelys SEG, as a high performance physical or virtual appliance in your data center, to help secure the dynamic enterprise attack surface.

DMARC Email Security

Stop cyber-criminals from sending email using your domain and protect customers, suppliers and your employees from attacks.

How secure is your brand name from email scammers? Leave your details below, we’ll run the analysis and revert to you within 24 hours with a specific report (example here) which will be emailed to you.

    Endpoint Security

    Securing your endpoints against today’s threats on a myriad of devices can be quite a challenge for a number of reasons. Managing separate endpoint features is complex and time consuming. Disparate security products don’t share intelligence, resulting in slow threat response. And, lack of IT expertise to effectively administer endpoint security can let threats into your network. Intelys delivers easy-to-manage, automated, fully customizable endpoint security for a broad set of devices, removing those challenges.

    DDoS Protection

    Intelys DDoS includes a Sensor component which detects volumetric DDoS attacks by leveraging an extremely fast and highly innovative traffic anomaly detection engine.

    Read More

    DDoS Detection

    It profiles the on-line behavior of users and compares over 130 live traffic parameters against user-defined thresholds. The reaction to threats is automated using predefined action modules able to send notification emails, announce prefixes in BGP, generate SNMP traps, modify ACLs and execute custom scripts with access to an easy-to-use API that exposes 80+ live parameters. DDoS attacks are detected through packet sniffing, SNMP polling, or by using multi-vendor flow-based technologies.

    DDoS Mitigation          

    Intelys DDoS mitigation includes a Filter component which ensures zero downtime for customers and services during Distributed Denial of Service attacks, without requiring operator intervention. It defends against DDoS attacks by cleaning the malicious traffic on-premise and notifies the attacker’s ISP during non-spoofed attacks. The malicious packets are blocked using intelligent, dynamic filtering rules that are applied to stateless software or hardware firewalls, or on BGP FlowSpec-capable routers. It can perform side-filtering with BGP off-ramping, or it can run on dedicated packet scrubbing servers deployed in the main data path.

    Full Network Traffic Visibility

    Intelys provide full network traffic visibility by using distributed Sensors (“probes”) able to capture IP packets, query SNMP devices and analyze flow records exported by Cisco NetFlow, Huawei Netstream, Juniper jFlow, cflowd, sFlow and IPFIX. All the collected data are accessible in a web-based user interface that provides custom dashboards, real-time traffic graphs and top statistics. You can quickly generate complex analytics with aggregated data for hosts, departments, interfaces, applications, protocols, autonomous systems and countries; view accurate bandwidth graphs for thousands of IP addresses, inspect packets and flows.

    PCI Compliant Infrastructure Hosting

    The PCI Data Security Standard (PCI DSS) provides a definitive set of data security requirements for organizations in the Payments Industry. Meeting these standards is essential for keeping your company’s sensitive financial information safe and, just as importantly, letting your clients know they can trust your organization with their financial data.

    Read More

    At Intelys, our PCI compliant infrastructure hosting solution is based on industry-proven methodologies and best-of-breed service offerings. We believe in surpassing compliance expectations, and our CCIE and CISSP certified professionals have designed our compliance solutions to meet or exceed all PCI merchant and service provider requirements.

    Intelys delivers a private cloud and dedicated server options, giving your company the confidence and flexibility to run your security-sensitive financial operations in the environment that works best for you.

    Managed cloud services to achieve IT efficiencies, increase capacity and flexibility without having to make capital investments.

    Security defences include Web Application Firewalls, Logging, SIEM and IDS/IPS.

    Web application firewall

    Clients are provided with a service whereby firewalls are monitored “24/7” (twenty four hours a day, seven days a week). Our highly experienced certified security specialists will maintain security policies, backups and perform software and patch upgrades.

    UTM features include: Control inbound and outbound access to the network, control access to websites and apps, prioritize traffic, dynamic filtering and block inappropriate web content.


    Logging to help lower risk, improve security posture and reduce operational complexity.

    Log data is the definitive record of what’s happening in an organisation and is an underutilized important source of truth for troubleshooting issues and supporting broader business objectives. Application logs and other machine data that’s highly variable, and in some cases unstructured, contains important data that traditional log management solutions don’t support or simply miss.

    SIEM (Security Information and Event Management)

    All data is monitored and considered security relevant and is indexed and analysed in real time.

    Features include: aggregate and evaluation all security and compliance events, reporting and alerting, prevention of the spread of malware and advanced/unknown threat detection.

    IDS/IPS (Intrusion Detection and Prevention System)

    Our security specialists conduct ongoing forensic and trend analysis, and configure the IDS/IPS to control and monitor the health and performance of network security appliances.

    We will be alerted when a host violates a configuration policy or attempts to access an unauthorized system. Malware can be detected and blocked utilizing cloud-analytics and Collective Security Intelligence.

    The Enterprise Immune System

    Learns the ‘self’ of your organization — automatically, No rules or signatures, Math & machine learning, Real-time threat detection

    Read More

    The Enterprise Immune System is the world’s most advanced machine learning technology for cyber defense. Inspired by the self-learning intelligence of the human immune system, this new class of technology has enabled a fundamental shift in the way organizations defend themselves, amid a new era of sophisticated and pervasive cyber-threats.

    The human immune system is incredibly complex and continually adapts to new forms of threats, such as viral DNA that constantly mutates. It works by learning about what is normal for the body, identifying and neutralizing outliers that do not fit that evolving pattern of normality.

    Darktrace applies the same logic to enterprise and industrial environments. Powered by machine learning and AI algorithms, Enterprise Immune System technology iteratively learns a unique ‘pattern of life’ (‘self’) for every device and user on a network, and correlates these insights in order to spot emerging threats that would otherwise go unnoticed.

    Like the human immune system, the Enterprise Immune System does not require previous experience of a threat or pattern of activity in order to understand that it is potentially threatening. It works automatically, without prior knowledge or signatures, detecting and fighting back against subtle, stealthy attacks inside the network — in real time.

    Cloud Security

    Intelys Cloud Assessment and Testing services provide end-to-end consultation for all stages of your cloud investment – from initial evaluation and architecture, to ongoing assessments, testing and compliance auditing.

    Read More

    If you are already using a Cloud Service Provider (CSP), our cloud security assessment can determine if you are secure and compliant with mandates for your industry. We measure the security posture of your cloud provider and offer recommendations for a cloud security framework based on your goals and objectives.

    Our cloud governance, risk and compliance consulting services help design and calibrate your security operations to help you move to the cloud securely and without risking cloud data security.

    When migrating to the cloud, organisations need to consider the wide range of data that could be affected – everything from routine correspondence to highly sensitive intellectual property. We offer a strategic cloud assessment that includes recommendations for data classification and selecting the best cloud solutions based on your data and privacy requirements.

    Amazon Web Services (AWS) and Microsoft Azure

    Migrating to the cloud doesn’t make security logs go away. Log events must be analysed and correlated to rapidly identify potential threats before damage occurs. Monitoring is also fundamental to maintaining compliance with industry mandates.

    You can increase your productivity and stop chasing false alarms with our 24×7 expert management, support and monitoring for AWS and Azure. Our Managed Security Solutions provides integrated monitoring with the rest of your security landscape.

    Integrated monitoring involves more than just analytics of volumes of data. Our cloud security experts help you leverage actionable intelligence that identifies true anomalies from routine events.