NEC XON Western Cape has launched Decypher, a new managed and shared service to help small to medium sized (SME) businesses overcome their biggest and most common IT-related challenges.
Decypher is a cloud-based software as a service and security network management service specifically for the SME market.
This is the only service of its kind in the country designed for the SME. It helps businesses analyse their networks, understand the complete environment, manage it effectively through a single pane, and garner a number of resultant benefits.
NEC XON’s Decypher is a 24×7 service that flexibly adapts to the SME’s specific needs. The service provides standard packages based on the number of users, the amount of data that can be retained, and the reports it provides. However, it can be adapted based on the length for which the data must be kept, and adjusted according to different storage requirements, as well as other services the business may need.
The single pane view into the business’s network has a number of benefits, including simplifying management, improving security, reducing operational overheads, and reducing costs, says Kewney.
The data is encrypted, connects securely and does not impact the customer’s connectivity. Decypher is fully redundant since it is designed in a high availability (HA) stack of mirrored devices via a virtual environment. It is a shared environment, which is one of the methods used to reduce costs. However, it uses FortiGate Virtual Domains that provide separate firewall policies and even completely separate configurations for routing and VPN services for each connected network or organisation.
Ops people get customisable network operations centre (NOC) and security operations centre (SOC) dashboards and widgets designed for display across multiple screens. They monitor events in real-time through pre-defined dashboard views for SD-WAN, VPN, WiFi, incoming/outgoing traffic, applications and websites, FortiSandbox detections, endpoint vulnerabilities, software inventory, top threats, shadow IT monitoring, ZTNA, and many more.