network security management

Peters & Associates’ IT and network solutions will protect your networks, digital assets and data.

Protect and safeguard the critical digital assets of your organization from hackers, competitors, and unauthorized employees. Keep your network, customer data and any sensitive information safe. A network security audit now will save potentially millions later, while protecting the health of your organization.

Peters & Associates Security Solutions has the following core services:

24×7 Support with 4 Tier Escalation

  • Level 1 — Consultants
  • Level 2 — Senior Consultants
  • Level 3 — Engineers, Developers
  • Level 4 — Vendor Support

Service Level Agreements

  • Standard or customized service level agreements

Security Device Monitoring

  • Network devices including switches, routers, wireless LAN
  • Security devices (Firewalls, Network IPS, Web/Email, Gateways, Malware Protection, Vulnerability Scanners)
  • Servers including Windows, Linux, AIX, HP UX
  • Infrastructure services including DNS, DHCP, DFS, AAA, Domain Controllers, VoIP
  • User-facing applications including web servers, app servers, mail, databases
  • Storage devices including NetApp, EMC, Isilon, Nutanix, Data Domain
  • Cloud apps including AWS,, Okta,
  • Cloud infrastructure including AWS
  • Environmental devices including UPS, HVAC, Device Hardware
  • Virtualization infrastructure including VMware ESX, Microsoft HyperV


  • Unified NOC and SOC analytics
  • Notification and incident management
  • Event correlation
  • Base-lining and statistical anomaly detection
  • Real-time configuration change monitoring
  • Network device configuration backups & audit control
  • Dynamic user identity mapping
  • External threat intelligence
  • Custom log parsing
  • 60 days of data storage for alerts
  • Compliance reporting for PCI, DSS, HIPPA, SOX, NERC, FISMA, ISO, GLBA, GPG13, and SANS Critical Controls

VM Data Security – Your Cloud Environment

Secure your data with VM-Level protection for private data to various environments in your cloud services.

  • Patching monitoring
  • Log & event management
  • Managed malware protection
  • File integrity monitoring
  • External Vulnerability Scans

VM Data Security – Our Cloud Environment

Secure your data with VM-Level protection for private data in our Private Cloud.

  • Hypervisor firewall
  • Anti-malware protection
  • OS file integrity monitoring
  • Hardened operating system
  • Patching management
  • Log management & SIEM
  • Managed malware protection
  • File integrity monitoring
  • Vulnerability scans

Server Patch Management

  • Scheduled deployment of Microsoft security patches/hotfixes

User Entity Behavior Analytics

User Entity Behavior Analytics (UEBA) continuously learns from the behavior of organizational entities (users, devices and resources) and adjusts itself to reflect the changes in your rapidly evolving enterprise. As attacker tactics get more sophisticated, UEBA helps you adapt to the changing nature of cyber security attacks with continuously learning behavioral analytics.

  • Detection and alerting of user behavior anomalies
  • Provide entity level behavioral monitoring for a specific environment, re: SharePoint, to report anomalous behavior and trends

External or Internal Vulnerability Scan

  • Using port scanning technologies to determine vulnerabilities on up to 12 externally-facing IP addresses on devices such as firewalls, routers, web hosts, and servers
  • Detection of patch and/or configuration issues
  • Provide an interpretation of the data, including recommendations for remediation of findings

Information Security Education & Training

Comprehensive training courses for security awareness training with specific modules for FFIEC, PCI, and HIPPA. The training catalog includes but is not limited to:

  • Intro security awareness training
  • Ransomware
  • Strong passwords
  • Handling sensitive information securely
  • Mobile data security
  • Basics of credit card security
  • PCI compliance simplified
  • Financial institution physical security
  • GLBA compliance course
  • PCI simplified
  • CEO fraud

Social Engineering Evaluation

Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

  • Email and/or phone phishing campaign targeting a select number of employees

Security Advisory Services

  • Evaluate current procedures / identify efficiencies and recommend improvements
  • Provide guidance on future security strategies
  • Assist in the preparation of budgetary numbers / spend analysis
  • Identify gaps in security strategy / product set
  • Assist in evaluating current issues/incidents and provide guidance on remediation
  • Maintain documentation of the current state of the Information Security Program / provide summaries to executive management
  • Perform duties where a skillset may be lacking (e.g. vendor management)

Additional Services

Additional IT security solutions include but are not limited to:

  • Identity access management (gap assessment)
  • Disaster recovery / business continuity planning
  • IT risk assessment
  • Incident response plan & management
  • Vendor management (gap assessment)
  • Patch management program
  • Cyber security assessment
  • Data classification

How safe is your data? Don’t risk your organization, your customers, and your job.
Protect all of it. Now. Contact us for a cyber security network assessment.

free trials

Off-board your IT management to industry experts to keep your business tech secure and optimized so your teams can get back to business initiatives. Contact one of our IT consultants in Chicago to find out what secure, scalable, and optimized solutions are right for you.