Skip to main content

Expert Deployment Service Description

Expert Deployment Service Description

The Outpost24 Expert Deployment packages are directed at organizations that want to be up and running with the Outpost24 solutions quickly and according to best practices. With hundreds of successful deployment under our belt, the Outpost24 Managed Services team has years of implementation experience in customers’ environments and is skilled at advising the best suited deployment and configuration to fit your business needs and improve your security posture.


Deployment process

Depending on the scope of your environment the expert deployment timeline can vary between 1 and 3 months. Regardless of the scope, Outpost24 always follows a step-by-step process ensuring a successful deployment.


Image 1: Example of an onboarding plan & Responsibilities

Image 1: Example of an deployment plan & responsibilities



The steps in the deployment process are as follows:

StepCustomer Outpost24
Scoping DocumentationProvide an overview of the scope, including specific requirements for the deployment such as target structure or custom attributes
Kick-off
Outpost24 will align with the relevant stakeholders, explain the deployment process, provide relevant documentation and discuss the requirements
Deployment Architecture
Together with the Customer, Outpost24 will design the preferred architecture to fit your requirements and ensure the environment is scanned in the optimal manner. This will include the location of the scanners and place where the data is stored
Access MethodProvide the required temporary access for Outpost24 to be able to access the environment and configure the solution
Network & Firewall RulesImplement required network changes and firewall rules in accordance with the determined architecture in order for the scanners to be configured and scan properly
Scanner DeploymentDownload and deploy the VM’s in your environment and provide an IP address
Scanner Installation
Outpost24 will test access to the scanners and configure the distribution settings in line with agreed solution architecture
Discovery Scanning
Outpost24 will perform a discovery scan on the environment to verify all active targets in scope
Scan Policy Definition
Outpost24 will set up the preferred scan policy
IP/Application configuration
Outpost24 will configure the IP’s or (authenticated) applications in the tool
Target Grouping
Outpost24 will create a target structure in line with your business and according to the requirements indicated in the scoping document
Event Notifications
Outpost24 will set up event notifications to your different teams ensuring you are notified when you want to be
Scan Scheduling
Outpost24 will set up a scan schedule ensuring your environment in scanned successfully in a preferred timeframe
User Configuration
Outpost24 will configure the users and their required user roles and access level
Reporting Configuration
Outpost24 will create various report templates as well as scheduling these to be delivered to the different teams



Package overview


SMALL

Up to 500 IPs

MEDIUM

Up to 2,000

LARGE

Up t0 10,000

X-LARGE

Up to 50,000

Architechture


Requirement Assessment

chek service descriptionchek service descriptionchek service descriptionchek service description

Deployment Design

chek service descriptionchek service descriptionchek service descriptionchek service description

Deployment Assistance

chek service descriptionchek service descriptionchek service descriptionchek service description

Distributed Environments


chek service descriptionchek service descriptionchek service description

HIAB Installation

1Up to 5Up to 15Up to 30

Configuration


User Management

chek service descriptionchek service descriptionchek service descriptionchek service description

Target Management

chek service descriptionchek service descriptionchek service descriptionchek service description

Scan Templates

chek service descriptionchek service descriptionchek service descriptionchek service description

Event Notifications

chek service descriptionchek service descriptionchek service descriptionchek service description

Custom Attributes

chek service descriptionchek service descriptionchek service descriptionchek service description

Number or IPs

Up to 500Up to 2.000Up to 10.000Up to 50.000

Non-authenticated Application Configuration

Up to 10Up to 25Up to 50Up to 150

Authenticated Application Configuration

Up to 2Up to 5Up to 10Up to 50

Cloud Configurations

Up to 10Up to 25Uo to 50Up to 100

Scanning


Discovery Configuration

chek service descriptionchek service descriptionchek service descriptionchek service description

Scan Scheduling

chek service descriptionchek service descriptionchek service descriptionchek service description

Scan Policy Customisation

chek service descriptionchek service descriptionchek service descriptionchek service description

Netsec Authentication Setup

chek service descriptionchek service descriptionchek service descriptionchek service description

Asset Management

chek service descriptionchek service descriptionchek service descriptionchek service description

Standard CIS Compliance Scanning

chek service descriptionchek service descriptionchek service descriptionchek service description
Reporting

Report Templates

Up to 3Up to 5Up to 10Up to 25

Scheduled Reporting

chek service descriptionchek service descriptionchek service descriptionchek service description
Dynamic Groups


chek service descriptionchek service descriptionchek service descriptionchek service description

Maintenance


Scheduled Updates

chek service descriptionchek service descriptionchek service descriptionchek service description

Automated Backup

chek service descriptionchek service descriptionchek service descriptionchek service description
Integrations

AD/LDAP

chek service descriptionchek service descriptionchek service descriptionchek service description

Additional Integrations

To be scopedTo be scopedTo be scopedTo be scoped

Documentation


Deployment Documentation

chek service descriptionchek service descriptionchek service descriptionchek service description

Implementation Diagrams

chek service descriptionchek service descriptionchek service descriptionchek service description

Implementation Timeline


Time-boxed Implementation

Up to 1 mUp to 1,5 mUp to 2 mUp to 3 m

Add-Ons

The Expert Deployment packages can be combined with the following services (price upon request)

User Training

Outpost24 offers a variety of education packages ranging from Instructor-led courses, customized education, certification and developer training

Expert Support

https://outpost24.com/service-description/customer-support


Implementation Prerequisites & Conditions

  • Scoping documentation has to be completed by customer in advance of project start date
  • Customer is responsible for internal alignment within different teams/Opco’s/Sites/Business Units
  • Customer is required to submit internal change requests for Appliance installations, firewall rules, whitelisting etc.
  • All implementation projects are supported remotely. Any on-site requirements need to be scoped separately and will include travel and accommodation costs
  • User training is not part of the implementation services and will have to be scoped separately by the Outpost24 Training Department.

Looking for anything in particular?

Type your search word here