GEMS Logo Web

Every day new malicious threats and attacks coordinated by sophisticated, well-funded organizations seek to wreak havoc on IT Networks and Systems.

In today’s environment, organizations must be armed and ready for threats, whether generated externally or internally, and understand that Network Security can no longer be put on auto-pilot. Many organizations, though, continue to be challenged by managing these complex solutions in-house and lack skilled security expertise able to carry the burden of day-to-day management.

Securing your network perimeter is the first line of defense in an effective information security strategy. Network firewalls, whether unified threat management (UTM) or next-generation firewall (NGFW), form the foundation necessary to protect your organization’s data, network, and critical assets.

GEMS Flow 2

GCSIT Managed Network Security Program is designed to address all the complexities associated with deployment and management of your Network Security.

GCSIT provides firewall administration, log monitoring, and response to security and device health events. Drawn from years of experience in Professional Services Delivery working in and around the latest security techniques, GCSIT has packaged all of this into an accountable, fully-managed, and well-defined services model able to ensure detection, prevention, and response to threats at a consistent monthly cost -- that can go down over time.

gems onboarding icon ONBOARDING

We begin your Network Security Services Support Program relationship with GCSIT through Onboarding.

Your GCSIT Portfolio and Program Manager (PPM) is assigned to act as your single point of contact. This individual leads the working teams and helps to build a mutually agreed transition strategy and a well-defined plan to ensure an effective and non-disruptive transition.

The Onboarding engagement begins with establishing a well-informed starting point for services delivery. This may include GCSIT Quick Assess, a speedy approach to understanding the nuances of the environment, or a more comprehensive GCSIT Security Assessment to ensure understanding of your network and system topology, and security policies. The security assessment digs deep to understand business drivers, the current infrastructure, and technical requirements.

As part of the security assessment, a qualified analyst works with your staff to perform a detailed examination of the network configurations and conduct a vulnerability scan of all connected devices. GCSIT will provide remediation recommendations for any items found in the security assessment that sit outside of best practices. These topics are all discussed during follow-up workshops with formalized documentation compiled into a report identifying areas where potential configuration issues or vulnerabilities create risk for your business.

After the assessment phase of Onboarding, GCSIT Team Members work with defined customer point(s) of contact to plan how design and implementation of the ongoing service set will be delivered. This planning sets organizational service level goals prioritized by business group and business outcome. The On-Boarding Process includes clear timelines and transition goals aligned to meet those desired outcomes. During this phase, GCSIT creates customer-specific contact, how-to, and point-in-time environmental documentation to be reviewed and approved by your defined point(s) of contact. This information will also be uploaded to and made available from the Shared Documentation Platform that GCSIT provides as part of the ongoing GEMS Service.

gems operational excellence 1OPERATIONAL EXCELLENCE

Your PPM will continue to act as your single point of contact. Alongside this, GCSIT has a defined set of processes and responsibilities designed to ensure regular and thoughtful communication and advocacy for our GEMS clients. Foremost among these activities are your regularly scheduled Stewardship meetings.

Regular Stewardship is an ongoing process that provides an opportunity to combine forces across GCSIT departments and your team to increase understanding, overcome any issues and resolve the best solutions & strategies for your needs. In each stewardship meeting, we look at what GCSIT is working on, what’s working, why it’s working and how we can make it work better.

GCSIT Stewardship builds a unified vision, transfers knowledge to you team members and engages in proactive and continuous improvement through analysis, communication and partnership. It is an ongoing process that brings key players from GCSIT and your team together to address constantly-changing user and business needs and execution of services delivery.

Through GCSIT’s commitment to operational excellence you are ensured a predictable, reliable, accountable services delivery partner who can help to drive down costs while providing transparency, increasing efficiency, productivity, and end user satisfaction

Managed Network Security Program Services

Your GEMS Managed Network Security Program allows you the flexibility to choose from a set of offerings specially designed to meet your unique needs.  

  • Managed Firewall
  • Managed Anti-SPAM and Malware

GCSIT's accountable, fully-managed, and well-defined services model  provides detection, prevention, and response to threats at a consistent monthly cost -- that can go down over time. time 

For more information or to begin putting GEMS to work for you, please email or call GCSIT at 866.424.2766