Professional Services & Compliance


360Security team of network and security engineers have worked in thousands of unique environments providing expertise to organizations of all sizes. And our engineers have been with us for an average of 15+ years, almost unheard-of longevity for our industry. When you partner with 360Security, you can expect strategic advice and decision support, proper implementation of technologies chosen, and ongoing engagement. We prefer to stay connected with our clients for the long term as a true partner and advisor.

Compliance Services

  • Policy Development
  • Data Protection Program
  • Cybersecurity Framework
  • Compliance and Best Practice Gap Assessments
  • Mobile Device Security
  • Network Security
  • Cyber Security Training
  • Security Assessments
  • Threat Mitigation
  • Vulnerability Management
  • Remediation Recommendations and Assistance
  • BCP/IRP/DR Testing and Validation

Access Control & Security Policy

  • Firewalls: Internet facing, internal data center, and branch office, high throughput >10Gbps, next gen application and content aware
  • SSL Application Portal: Traditional remote access solutions over SSL and internet and intranet facing application portals
  • AAA: Authentication, Authorization, and Accounting solutions for securing access to wired and wireless networks and management systems
  • 802.1x: In combination with AAA to enforce authenticated access to all network resources
  • Content Security: Web Proxy: Access control for web-based applications


  • Routing: BGP, EIGRP, OSPF, Internet campus MAN, WAN, VRF, MPLS
  • Switching: 10/40/100 GB Campus/data center
  • Wireless: Campus controller based, location
  • VPN: Integrated firewall
  • Load Balancing: Application resilience, performance scaling
  • MAN/WAN: MPLS, traffic shaping, QoS
  • WAN Acceleration: TCP optimization, caching, voice and video
  • Bandwidth Management: Application based traffic shaping
  • Virtual Office: Secure virtualized office systems including voice, video, VPN

Security Process

  • Assessment: Needs analysis, gap analysis, strategic planning
  • Compliance: PCI, HIPAA
  • Security Information & Event Management: Tools for enforcing security processes and compliance
  • Log Management & Analysis: Archival, auditing, compliance
  • Vulnerability Assessment
  • Lifecycle Management: Strategic planning, infrastructure maintenance contracts, technology refresh

Threat Mitigation

  • Intrusion Detection/Prevention: In line and out of bound systems for detecting network-based threats, events sent to SIEM for correlation and response
  • Anti-Virus: Host-based systems for malware detection
  • Botnet Detection: Cybercrime, espionage, targeted attack mitigation
  • Data Leakage Prevention: Protecting business critical data from unauthorized access

Next Gen Data Center

  • Virtualization: Hardware abstraction, bare metal, multicore, large addressable memory spaces
  • SAN: Storage, iSCSI, FCoE
  • Fabric: Data center switching technologies
  • vDI: Virtual desktops, snapshots, thin provision

Unified Communications

  • Voice over IP: Hard/soft phone call control
  • Video: Telepresence, high definition, multiparty, training and content, multicast
  • Presence: Real-time availability, business efficiency
  • SIP Trunking: Bypass traditional PSTN, cost efficiency, performance and resilience
  • Mobility: Office communications portability to mobile devices
  • Voice over Wireless: RF Analysis, AP capacity planning, QoS, roaming