Network and Security Infrastructure 

LCM Security works with our customers to put together recommendations to meet compliance and security requirements and to improve the general security baseline within the organization. LCM recommends technologies and processes that meet these requirements. Major components incorporated in LCM’s recommendations include, but are not limited to: 

  • Network segmentation
  • Improved access control and authentication
  • Implementation of a web application firewall (WAF), and
  • Core and perimeter IPS. 


LCM technologies and processes address further security threats, Advanced Persistent Threats (APTs) and the threats associated with deliberate or accidental incidents caused by internal personnel.  LCM works with the customer to implement the right technology and monitoring processes that enable the monitoring and tracking throughout the evolution of the APT and that generally go unnoticed until a breach has already occurred. In order to address these threats, changes in security components, monitoring and incident response processes will be engineered and implemented.  The monitoring of critical infrastructure is also a crucial component in which LCM assists or outsources for its customers to be able to report, alert, and most importantly quickly react to security incidents.

Technologies 

We have made an effort to select products that consolidate multiple technologies into a security fabric. The Security Fabric delivers broad protection and visibility to every network segment, device, and appliance. Automatically synchronize your security resources to enforce policies, coordinate automated responses to threats detected anywhere in your network, and easily manage all of your different security solutions and products through a single console.


Security Fabric Components Include:

  • UTM and Next Generation Firewalls
  • Web Application Firewall (WAF)
  • Secure Switches 
  • Wireless Networks
  • Security Scanning
  • End-Point Security 
  • Secure Network Access 
  • Security Information and Event Management (SIEM)