Reactive Incident Response
Proactive Incident Response
Automated incident response
Intrusion detection and prevention
Network usage scanning (for unusual behaviour)
Real-time intrusion/threat detection
Troubleshooting performance degradation of services
Vulnerability and Risk scanning
Vulnerability and Risk management
Enhanced network performance monitoring/infrastructure availability
Security Awareness Training
Baseline Email Phishing Campaign
Simulated Phishing Attack
Security Awareness Videos
Additional Phishing Campaigns
Quarterly Video Training (PCI, HIPPA, etc.)
Endpoint Detection and Response (EDR)
Investigation of Indicators of Compromise (IOCs)
Threat Containment & Remediation
Activity Report and Threat Hunting
Fully managed dark web status monitoring
Email, password breaches sold on the Web
Real-time notifications with details of compromises
Security Operation Center & SIEM
24x7x365 Security Operations Center (SOC)
SIEM Solution with high-speed, real-time analysis of event logs
Human-Led Threat Hunting And Response
24/7 Lead-driven Threat Hunting
Threat Neutralization & Remediation
Proactive Security Posture Management
Identity Access Management
Application Credential Management
Multifactor Authentication
Self-Service Access Request
User Provisioning & Management
Active Directory Detail/ users, Service Accounts, Security groups, Org
units, Group Policy objects.
Administrative rights granted
Anomalous user logins (potential hacking)
Application installed on locked down systems
Application vulnerabilities
Application Warranty Validity,/ Vulnerability Monitoring
Continual IT assets scanning and documentation
Continual Security scanning, Penetration testing and remediation
recommendations with ransomware protection.
Critical patches not applied
Excessive inactive SharePoint sites
Firewall has open ports with known exploitable issues
Identify aging infrastructure blindspots
Improper network share permissions (security issues)
Improper physical security for server
Incorrect and/or inconsistent application of security settings
Missing or out-of-date antivirus and anti-spyware
Multi-factor authentication not Implemented
Rogue or unauthorized devices and computers on customer network
detected
Suspicious user logons detected
Systems inside the network with exploitable ports/protocols detected
Systems with weak local passwords detected
Unauthorized access to computer
Unauthorized printer on network
Unauthorized wireless connection
Unsupported operating systems in use
Untested or missing back-up / business continuity
Unusual logon time by user
Unusual logon to computer by user
Weak/insufficient password requirements