Skip to main content

Expert Deployment Service Description

The Outpost24 Expert Deployment packages are directed at organizations that want to be up and running with the Outpost24 solutions quickly and according to best practices. With hundreds of successful deployment under our belt, the Outpost24 Managed Services team has years of implementation experience in customers’ environments and is skilled at advising the best suited deployment and configuration to fit your business needs and improve your security posture.

Deployment process

Depending on the scope of your environment the expert deployment timeline can vary between 1 and 3 months. Regardless of the scope, Outpost24 always follows a step-by-step process ensuring a successful deployment.

deployment process
Image 1: Example of an deployment plan & responsibilities

The steps in the deployment process are as follows:

Step Customer Outpost24
Scoping Documentation Provide an overview of the scope, including specific requirements for the deployment such as target structure or custom attributes
Kick-off Outpost24 will align with the relevant stakeholders, explain the deployment process, provide relevant documentation and discuss the requirements
Deployment Architecture Together with the Customer, Outpost24 will design the preferred architecture to fit your requirements and ensure the environment is scanned in the optimal manner. This will include the location of the scanners and place where the data is stored
Access Method Provide the required temporary access for Outpost24 to be able to access the environment and configure the solution
Network & Firewall Rules Implement required network changes and firewall rules in accordance with the determined architecture in order for the scanners to be configured and scan properly
Scanner Deployment Download and deploy the VM’s in your environment and provide an IP address
Scanner Installation Outpost24 will test access to the scanners and configure the distribution settings in line with agreed solution architecture
Discovery Scanning Outpost24 will perform a discovery scan on the environment to verify all active targets in scope
Scan Policy Definition Outpost24 will set up the preferred scan policy
IP/Application configuration Outpost24 will configure the IP’s or (authenticated) applications in the tool
Target Grouping Outpost24 will create a target structure in line with your business and according to the requirements indicated in the scoping document
Event Notifications Outpost24 will set up event notifications to your different teams ensuring you are notified when you want to be
Scan Scheduling Outpost24 will set up a scan schedule ensuring your environment in scanned successfully in a preferred timeframe
User Configuration Outpost24 will configure the users and their required user roles and access level
Reporting Configuration Outpost24 will create various report templates as well as scheduling these to be delivered to the different teams

Package overview

SMALL

Up to 500 IPs

MEDIUM

Up to 2,000

LARGE

Up t0 10,000

X-LARGE

Up to 50,000

Architechture

Requirement Assessment

chek service description chek service description chek service description chek service description

Deployment Design

chek service description chek service description chek service description chek service description

Deployment Assistance

chek service description chek service description chek service description chek service description

Distributed Environments

chek service description chek service description chek service description

HIAB Installation

1 Up to 5 Up to 15 Up to 30

Configuration

User Management

chek service description chek service description chek service description chek service description

Target Management

chek service description chek service description chek service description chek service description

Scan Templates

chek service description chek service description chek service description chek service description

Event Notifications

chek service description chek service description chek service description chek service description

Custom Attributes

chek service description chek service description chek service description chek service description

Number or IPs

Up to 500 Up to 2.000 Up to 10.000 Up to 50.000

Non-authenticated Application Configuration

Up to 10 Up to 25 Up to 50 Up to 150

Authenticated Application Configuration

Up to 2 Up to 5 Up to 10 Up to 50

Cloud Configurations

Up to 10 Up to 25 Uo to 50 Up to 100

Scanning

Discovery Configuration

chek service description chek service description chek service description chek service description

Scan Scheduling

chek service description chek service description chek service description chek service description

Scan Policy Customisation

chek service description chek service description chek service description chek service description

Netsec Authentication Setup

chek service description chek service description chek service description chek service description

Asset Management

chek service description chek service description chek service description chek service description

Standard CIS Compliance Scanning

chek service description chek service description chek service description chek service description
Reporting

Report Templates

Up to 3 Up to 5 Up to 10 Up to 25

Scheduled Reporting

chek service description chek service description chek service description chek service description
Dynamic Groups

chek service description chek service description chek service description chek service description

Maintenance

Scheduled Updates

chek service description chek service description chek service description chek service description

Automated Backup

chek service description chek service description chek service description chek service description
Integrations

AD/LDAP

chek service description chek service description chek service description chek service description

Additional Integrations

To be scoped To be scoped To be scoped To be scoped

Documentation

Deployment Documentation

chek service description chek service description chek service description chek service description

Implementation Diagrams

chek service description chek service description chek service description chek service description

Implementation Timeline

Time-boxed Implementation

Up to 1 m Up to 1,5 m Up to 2 m Up to 3 m

Add-Ons

The Expert Deployment packages can be combined with the following services (price upon request)

User Training

Outpost24 offers a variety of education packages ranging from Instructor-led courses, customized education, certification and developer training

Expert Support

https://outpost24.com/service-description/customer-support

Implementation Prerequisites & Conditions

  • Scoping documentation has to be completed by customer in advance of project start date
  • Customer is responsible for internal alignment within different teams/Opco’s/Sites/Business Units
  • Customer is required to submit internal change requests for Appliance installations, firewall rules, whitelisting etc.
  • All implementation projects are supported remotely. Any on-site requirements need to be scoped separately and will include travel and accommodation costs
  • User training is not part of the implementation services and will have to be scoped separately by the Outpost24 Training Department.

Looking for anything in particular?

Type your search word here