Venza debuts IT security managed services

Venza now offers information technology security managed services at its new security operations center in Pensacola, Fla. With an official ribbon-cutting event scheduled for February, the MSP division employs a full-time staff both locally as well as in remote locations securing the hospitality industry 24/7/365.

Pensacola was a top choice for Venza because of its municipal investments in the high-tech economy, a large cluster of IT companies, a talent pool consisting of many military veterans and the fact that it has some of Florida's best beaches was an added plus, Venza CIO David Christiansen said in a statement.

In hospitality today, a commitment to security is central to all intelligent IT initiatives. Venza MSP aims to be the hospitality industry's virtual chief information officer/chief information security officer. Along with ensuring that a hotel's network is properly monitored and managed, Venza MSP delivers the tools and resources necessary to deliver security, the company said. 

Venza’s logging, monitoring and incident response program focuses on keeping data secure while satisfying standards (International Organization for Standardization/International Electrotechnical Commission 27001) and compliance requirements (Payment Card Industry Data Security Standard, General Data Protection Regulation) implementing a layered security approach to ensure best practices for data integrity, according to the company.

Services include remote monitoring/management (24/7/365), patch management, next-generation endpoint protection, firewall management, disaster recovery encrypted backup, automated threat monitoring, vulnerability scanning (internal/external), remote access management, help desk support, mail protection/archiving and security information event management. 

Venza’s new Third Wall product allows Venza to set policies and procedures to establish "best practices" with built-in intelligence that is constantly searching for ransomware activity with counteractive measures that are put in place when malicious activity is detected.