Identify
Inventorying assets and vulnerabilities, measuring attack surface, prioritizing, baselining normal, threat modeling, risk assessment. To identify devices and applications across your network we utilize remote management software to continuously monitor your computers and infrastructure. These tools identify vulnerabilities and events to understand typical user behavior.
Protect
Preventing or limiting impact, patching, containing, isolating, hardening, managing access, vulnerability mitigation. We utilize software to protect your devices from external and internal threats and risks. We update and maintain security of your infrastructure through enterprise grade firewalls and switches. Your network will be assessed monthly to ensure it meets and maintains best practices for security. We protect sensitive data through various forms of encryption. All critical data is backed up in a secure cloud storage in case of cyber incident or natural disaster. We protect data outside of your network through data loss prevention policies.
Detect
Discovering events, triggering on anomalies, hunting for intrusions, security analytics. Through analyzing your behavior patterns, we detect when an anomaly occurs and respond immediately. Our Security Operations Center (SOC) is available 24 hours a day, 7 days a week to ensure your network is secure.
Respond & Recover
Acting on events, eradicating intrusion, assessing damage, forensic reconstruction. Returning to normal operations, restoring services, documenting lessons learned, resiliency.
User Training and Education
Employee users are the first line of defense in cyber security. When users are properly informed and trained they will be able to identify suspicious activity and report it through the proper channels.