Managed Threat Assessment


24/7 DETECTION – ANALYSIS – RESPONSE

Cyber attacks are now daily news in business and government sectors, and the statistics on current cyber security trends are alarming. Our managed cybersecurity services brings our customers the right combination of people, process and technology to fulfill 24×7 continuous monitoring and threat detection initiatives


We continuously identify security concerns that might otherwise go undetected…

Potentially insecure systems
Potentially insecure behaviors
Potentially insecure configurations
Potentially insecure process
Potentially insecure designs

…and provide remediation guidance




“Enabling Clients to achieve desired levels of compliance.”

Our Security Operations Center (SOC) provides actionable data and analytics that enable our clients to meet and maintain contractual, compliance and regulatory initiatives


 

SECURITY PLATFORM REPORTING

Vertek’s threat detection tools, analytics and expertise can help drive your information security roadmap


“Leveraging our SIEM/IDS/Vulnerability tool analytics, we can provide alarm, asset, user activity, security events, policy violation reports and more…”


 

SECURITY OPERATIONS REPORTING

Vertek’s Security operation center (SOC) activities and reports are tracked, reviewed and communicated monthly


“Records and accountability of tickets, alarms, maintenance, incident response, and monthly action items activities are all logged, tracked and available on Vertek’s client portal”


 

COMPLIANCE REPORTING

Vertek fulfills third-party assessment and 24/7 cyber monitoring which are core elements of any compliance or regulatory initiative


“Our people, process and technology enable Clients achieve desired levels of compliance. Evidence related to the tools, monitoring and assessment are delivered and tracked on our client portal.   Our service and reporting help our clients achieve various types compliance initiatives and or regulations, including FISMA, HIPAA, ISO27001/2 and PCI”


 

CYBER INCIDENT REPORTING

Vertek’s incident report templates are used to document a perceived breach or significant security risk to our Clients


“Client identifier, incident type, dates and timeline associated, perceived risks, perceived severity, actions and communications are all part of the executive summary.  We also capture event details specifics, such as system owner, system ID, alarm type, alarm category, detection method and timeline.  Lastly, we can provide a technical analysis of the event (to the extent we have access to the information required)”


No need to set up a 24/7 Security Operations Center (SOC), we’ve done it for you!


When properly managed, a Security Information and Event Management (SIEM) tool is a powerful and effective way to prevent attacks on your company’s data and infrastructure. However, many organizations don’t have the resources or the in-house expertise to maximize the return on their investment. Vertek provides a fully Managed Threat Intelligence program that optimizes and manages SIEM in an effort to prevent attacks and improve the security of your organization.


Managed Threat Intelligence (MTI) Bundles

 

  
 
Baseline inventory scanning and asset registration
Baseline vulnerability environment scanning
Baseline event correlation, tuning and alarm trimming
Basic threat dashboard and report creation
SIEM tuning
Vulnerability Scanning
Network and endpoint monitoring
Alarm Monitoring
Alarm Analysis
Remediation Guidance
Lifecycle Management
Service/Security Review

CORE
SIEM-as-a-Service
Baseline inventory scanning and asset registration : Included
Baseline vulnerability environment scanning : Included
Baseline event correlation, tuning and alarm trimming : Included
Basic threat dashboard and report creation : Standard + On-demand
SIEM tuning : Quarterly + On-demand
Vulnerability Scanning : Quarterly
Network and endpoint monitoring : Included
Alarm Monitoring : SIEM Coverage
Alarm Analysis : On-demand
Remediation Guidance : On-demand
Lifecycle Management : Included
Service/Security Review : Quarterly

CO-MANAGED
SIEM and SOC-as-a-Service
Baseline inventory scanning and asset registration : Included
Baseline vulnerability environment scanning : Included
Baseline event correlation, tuning and alarm trimming : Included
Basic threat dashboard and report creation : Advanced
SIEM tuning : Continuously
Vulnerability Scanning : Monthly
Network and endpoint monitoring : Included
Alarm Monitoring : SOC Coverage
Alarm Analysis : Included
Remediation Guidance : Included
Lifecycle Management : Included
Service/Security Review : Monthly

Outsource or Insource?

15 Reasons why outsourcing will save you time and money

Learn More

How Much Will You Save?

Use our outsourcing vs. insourcing calculator

Find Out

Vertek Managed Cybersecurity