x

Loading...

Overview

When it comes to cybersecurity there are millions of jobs unfulfilled and this problem gets acute with encryption and key management as more specialized skills are required. Due to the serious shortage of skills and trained personnel, it is becoming increasingly hard for enterprises to derive the best value out of their newly acquired data security solutions and are struggling to deploy the right security processes. At the same time, there has been a continuous uptick in data breaches and time to resolve security incidents has been increasing. The data security challenge for enterprises has now compounded.

We understand these challenges faced by your enterprise. And that is why we have devised Fortanix Services to help our customers solve these challenges and create cyber resilience across the organization. Right from planning, deployment, and implementation (PDI) to offering ongoing optimization and support, we cover the entire customer lifecycle. Your business is of great value to us and we are committed to providing you with the entire range of services to succeed in this project.

Fortanix Services Methodology

Services offered across customer lifecycle.

Step 1:

Planning, Deployment & Implementation

Planning, Design & Deployment Assistance
  • DSM Deployment service
  • Additional Cluster Deployment services
Implementation Assistance (specific use case implementation)
  • Custom professional service ― Transparent Database Encryption
  • Custom professional service ― Bring Your Own Key
  • Custom professional service ― Tokenization
  • Implementation and Integration services
  • Professional services (Integration or custom engineering)
Training Assistance
  • DSM Basic Training
  • Advanced Training

Step 2:

Operate

Support Program
  • Standard Support
  • Premium 24x7 support 1 year
  • Premium 24x7 support 3 years

Step 3:

Optimize

Technical Account Manager Assistance (TAM Service)
  • Technical Account Manager Enterprise
  • Technical Account Manager Professional
  • Technical Account Manager Essentials

Key Benefits

Training that helps your personnel become cybersecurity experts.
Training that helps your personnel become cybersecurity experts.
Includes knowledge transfer and As-Built documentation.
Includes knowledge transfer and As-Built documentation.
Optimize performance of your solution to its highest capability.​
Optimize performance of your solution to its highest capability.​
Get strategic view on new features, roadmap helping you adopt new technology faster.
Get strategic view on new features, roadmap helping you adopt new technology faster.
Designed to provide proactive support. Assigned a designated pool of Customer Success Engineers​.
Designed to provide proactive support. Assigned a designated pool of Customer Success Engineers​.
Delivered by our experts reducing risk and faster time-to-value​.​
Delivered by our experts reducing risk and faster time-to-value​.​
Best practice deployment​ and recommendations to mitigate risks, increase performance and maximize business value.
Best practice deployment​ and recommendations to mitigate risks, increase performance and maximize business value.
Dotted iconDotted icon

What we offer: Scope of services

Prev Image

1DSM Deployment Package

The package is designed to help customers get started with Fortanix DSM and get to understand the best practices, test, and validate the deployment.

  • Requirements gathering/solution workshop, and assistance with project planning.
  • Recommendation for design architecture best practices.
  • Cluster Deployment & Configuration.
  • First cluster in same Region deployment. Includes training.
  • Test and Validation of the Deployment.
  • Additional cluster service (Per additional cluster and Region deployment)

2Implementation Package

Implementation package is designed to help our customers get started with Fortanix solution and get the required assistance to customize and deploy based on their IT environment and custom use cases.

  • Requirements gathering/solution workshop, and assistance with project planning.
  • Recommendation for design architecture best practices​.
  • Cluster Deployment & Configuration.​
  • Test and Validation of the Deployment​.
  • Provide As-built documentation with architectural diagrams, configuration, and test results​.
  • Support customers on a specific use case and/or includes custom development​.
  • Typical use cases include Transparent Database Encryption, Secrets Management, Tokenization, Code Signing.
  • Post deployment support for 2 weeks​.
  • Includes Basic training.
  • Priced as a fixed-price service, based on number sites.
  • Implementation and Integration Services are also offered on a daily rate.
Next Image

Start your journey towards cyber resilience with Fortanix Services.