Managed SOC


24/7 DETECTION – ANALYSIS – RESPONSE

Cyber attacks are now daily news and the statistics on current cyber security trends are alarming.  Technology and security controls alone will not protect your assets.  These days business information lives everywhere and many organizations lack the resources to effectively detect, analyze and respond.  At Vertek, we offer comprehensive Security Operations Center (SOC) services to supplement your existing IT program.


Top reasons why organizations leverage Vertek

→ I need dedicated security focus, visibility and analytics
→ I need help managing the “flood” of security events
→ I need to hire security expertise to augment existing staff
→ I need an independent view relative to security and risk
→ I need assistance meeting regulatory or compliance requirements
→ I need to detect non-compliance violations, system or service audit failures
→ I need to revamp or develop Cyber Incident and Response (IR) capabilities in weeks not months



“Enabling Clients to achieve desired levels of compliance.”

Our Security Operations Center (SOC) provides actionable data and analytics that enable our clients to meet and maintain contractual, compliance and regulatory initiatives


 

SECURITY PLATFORM REPORTING

Vertek’s threat detection tools, analytics and expertise can help drive your information security roadmap


“Leveraging our SIEM/IDS/Vulnerability tool analytics, we can provide alarm, asset, user activity, security events, policy violation reports and more…”


 

SECURITY OPERATIONS REPORTING

Vertek’s Security operation center (SOC) activities and reports are tracked, reviewed and communicated monthly


“Records and accountability of tickets, alarms, maintenance, incident response, and monthly action items activities are all logged, tracked and available on Vertek’s client portal”


 

COMPLIANCE REPORTING

Vertek fulfills third-party assessment and 24/7 cyber monitoring which are core elements of any compliance or regulatory initiative


“Our people, process and technology enable Clients achieve desired levels of compliance. Evidence related to the tools, monitoring and assessment are delivered and tracked on our client portal.   Our service and reporting help our clients achieve various types compliance initiatives and or regulations, including FISMA, HIPAA, ISO27001/2 and PCI”


 

CYBER INCIDENT REPORTING

Vertek’s incident report templates are used to document a perceived breach or significant security risk to our Clients


“Client identifier, incident type, dates and timeline associated, perceived risks, perceived severity, actions and communications are all part of the executive summary.  We also capture event details specifics, such as system owner, system ID, alarm type, alarm category, detection method and timeline.  Lastly, we can provide a technical analysis of the event (to the extent we have access to the information required)”


No need to set up a 24/7 Security Operations Center (SOC), we’ve done it for you!


When properly managed, a Security Information and Event Management (SIEM) tool is a powerful and effective way to prevent attacks on your company’s data and infrastructure. However, many organizations don’t have the resources or the in-house expertise to maximize the return on their investment. Vertek provides a fully Managed Threat Intelligence program that optimizes and manages SIEM in an effort to prevent attacks and improve the security of your organization.


Managed Threat Intelligence (MTI) Bundles

 

  
 
Baseline inventory scanning and asset registration
Baseline vulnerability environment scanning
Baseline event correlation, tuning and alarm trimming
Basic threat dashboard and report creation
SIEM tuning
Vulnerability Scanning
Network and endpoint monitoring
Alarm Monitoring
Alarm Analysis
Remediation Guidance
Lifecycle Management
Service/Security Review

CORE
SIEM-as-a-Service
Baseline inventory scanning and asset registration : Included
Baseline vulnerability environment scanning : Included
Baseline event correlation, tuning and alarm trimming : Included
Basic threat dashboard and report creation : Standard + On-demand
SIEM tuning : Quarterly + On-demand
Vulnerability Scanning : Quarterly
Network and endpoint monitoring : Included
Alarm Monitoring : SIEM Coverage
Alarm Analysis : On-demand
Remediation Guidance : On-demand
Lifecycle Management : Included
Service/Security Review : Quarterly

CO-MANAGED
SIEM and SOC-as-a-Service
Baseline inventory scanning and asset registration : Included
Baseline vulnerability environment scanning : Included
Baseline event correlation, tuning and alarm trimming : Included
Basic threat dashboard and report creation : Advanced
SIEM tuning : Continuously
Vulnerability Scanning : Monthly
Network and endpoint monitoring : Included
Alarm Monitoring : SOC Coverage
Alarm Analysis : Included
Remediation Guidance : Included
Lifecycle Management : Included
Service/Security Review : Monthly

Reasons to outsource vs. insource cybersecurity services

15 Reasons why outsourcing will save you time and money

Learn More

What is a SIEM and why do customers need one?

It used to be that perimeter security solutions were enough...

Find Out

Vertek Managed Cybersecurity