Our Solutions and Services

Comprehensive protection.

A Security Operations Center (SOC) is the first line of defense against cyber attacks and plays a critical part of an organization’s threat containment strategy.

Despite best efforts and money spent, only 42% of organisations rate their SOCs as highly effective.

Staffing shortages, budget allocation, and inadequate analytics are among the challenges organisations face when implementing and operating a Security Operations Center.

SOC-as-a-Service has proved to be an invaluable solution to carry out critical security functions 24/7 year-round.

Attacks can hit at any time. Our SOC services are always on standby. We’re continuously monitoring, detecting, and remediating

Preparation and Preventative Maintenance

The threat landscape is always changing. Our SOC is team is always on high alert and dedicated to identifying the latest threats.

Continuous Proactive Monitoring

Constant monitoring is key to maximising visibility. To ensure your monitoring system is effective, the SOC team implements tools that scan your network, looking for anything that pops up as suspicious.

Alert Ranking and Management

Addressing an emerging threat is one of the most pivotal activities of an SOC. When a threat has been identified, it is the SOC that serves as the boots on the ground, and they are the first on the scene, taking appropriate action to protect the network and its users. This may involve shutting down endpoints completely or disconnecting them from the network.

Recovery and Remediation

At the recovery stage, all systems affected needs to be brought back online. This involves recovering lost data and examining data that may be compromised. Each endpoint within the attack vector is carefully examined to ensure the same incident doesn’t occur again.

Log Management

Logs contain a plethora of useful information about the system, including anything that may have infiltrated it. The SOC team carefully collect, maintain, and review log activities for traces of any threats.

Security Refinement and Improvement

Cybercriminals are constantly refining their tools and tactics and we must do the same. Our SOC makes continual improvements to its security measures and technology to stay ahead of the latest tools used by criminals and hackers.

Compliance Management

Compliance requirements come in two forms: those that are dictated by external governmental agencies and those that constitute best practices within an organisation. We ensure all workflow, internal policies and IT initiatives align with specific industry regulations.

The Cyber Resilience Review (CRR) is a no-cost, voluntary, interview-based assessment to evaluate an organization’s operational resilience and cybersecurity practices. Through the CRR, your organization will develop an understanding of its ability to manage cyber risk during normal operations and times of operational stress and crisis.

The CRR evaluates the maturity of your organization’s capacities and capabilities in performing, planning, managing, measuring, and defining cybersecurity capabilities across 10 domains:

Assessment Logistics

  • Notice required to schedule assessment: two weeks
  • Time needed to complete assessment: one business day
  • Personnel required to perform assessment: representatives covering the following functions: IT policy and governance, IT security planning and management, IT infrastructure, IT operations, business operations, business continuity and disaster recovery planning, risk management, procurement and vendor management.
  • Timeframe for return of assessment results: 30 days

Benefits and Outcomes

  • Through a CRR, your organisation will gain a better understand- ing of your cybersecurity posture. The review provides:
  • an improved organisation-wide awareness of the need for effective cybersecurity management;
  • a review of capabilities most important to ensuring the continuity of critical services during times of operational stress and crisis;
  • a catalyst for dialog between participants from different functional areas within your organisation;
  • a comprehensive final report using recognised standards to map the relative maturity of the organisational resilience processes in each of the 10 domains, and includes improvement options for consideration, and best practices as well as references to the CERT RMM; and
  • integrated peer performance comparisons for each of the 10 domains.

The External Dependencies Management (EDM) assessment is a no-cost, voluntary, interview-based assessment to evaluate an organisation’s management of their dependencies. Through the EDM assessments, organisations can learn how to manage risks arising from external dependencies within the information and communication technology (ICT) supply chain. The ICT supply chain consists of outside parties that operate, provide, or support ICT.

The ICT supply chain consists of outside parties that operate, provide, or support information and communications technology. Common examples include externally provided web and date hosting, telecommunications services, and data centres, as well as any service that depends on the secure use of ICT. Through the EDM assessment, the stakeholder will be able to evaluate the maturity and capacity to manage risks related to its external dependencies across three areas:

Assessment Logistics

  • Notice required to schedule assessment: 2 weeks
  • Time needed to complete assessment: 4 hours
  • Personnel required to perform assessment: Representatives covering IT Security Planning, Management, IT operations, Risk management, Business Continuity and Disaster Recovery Planning, IT Policy and Governance, Business Management, Procurement and Vendor Management, and Legal
  • Time frame for return assessment results: 30 days

The Cyber Infrastructure Survey (CIS) is a low-cost survey service that evaluates the effectiveness of organizational security controls, cybersecurity preparedness, and overall resilience. CIS provides an assessment of the organization’s cybersecurity practices in place for a critical service.

The CIS focuses on a service-based-view versus a programmatic-view of cybersecurity. Critical services are assessed against more than 80 cybersecurity controls grouped under five top-level domains: cybersecurity management, cybersecurity forces, cybersecurity controls, cyber incident response, and cyber dependencies. Following the assessment, your organization is provided with a user-friendly dashboard for reviewing and interacting with the survey findings. Your organization can use the dashboard to compare its results against industry peers, review results in the context of specific cyber and physical threat scenarios, and dynamically adjust the importance of in-place practices to see the effects on overall cyber protection.

Benefits and Outcomes

  • A CIS provides your organization with an effective assessment of cybersecurity controls in place for a critical service, a user-friendly, interactive dashboard to support cybersecurity planning and resource allocation (review results in the context of specific cyber and physical threat scenarios), and access to peer performance data visually depicted on the dashboard.

Assessment Logistics

  • Notice required to schedule assessment: 2 weeks
  • Time needed to complete assessment: 4 hours
  • Personnel required to perform assessment: CISO, ICS Security Manager and IT Security Manager
  • Time frame for return of assessment results: 30 days

The Phishing Campaign Assessment (PCA) is a low-cost, security awareness training offered to our clients, as well as Critical Infrastructure and Private Sector Companies, that evaluates an organisation’s susceptibility and reaction to phishing emails. The results of a PCA are meant to provide guidance, measure effectiveness, and justify resources needed to defend against spear-phishing and increase user training and awareness.

Assessment Logistics

  • Pre-assessment coordination and scheduling: two weeks
  • Time needed to complete the assessment: 6 weeks
  • Personnel required to perform assessment: Customer Designated Point of Contact and Coordination
  • Time frame for return of assessment results: 2 weeks

A Risk and Vulnerability Assessment (RVA) is a low-cost offering that combines national threat and vulnerability information with data collected and discovered through onsite assessment activities to provide customers with actionable remediation recommendations prioritised by risk. Engagements are designed to determine whether and by what methods an adversary can defeat network security controls. Components of the assessment can include scenario-based network penetration testing, web application testing, social engineering testing, wireless testing, configuration reviews of servers and databases, and evaluation of an organizations detection and response capabilities.

Deliverables

  • RVA Final Report – A report is developed and delivered to the customer
  • approximately two weeks after the engagement. The report includes business executive recommendations, specific findings and potential mitigations, as well as technical attack path details.
  • RVA Out-brief – An optional out-brief presentation is available from the test team at the end of the testing time frame. The team will cover preliminary findings and observations. The briefing can be tailored for technical staff or business executives.

Assessment Logistics

  • Service queue/ Wait list: customers are placed into a service queue upon their completion of the prerequisite Rules of Engagement. The wait list is evaluated on a quarterly basis and available assessment openings are filled. Wait time can vary but is typically not less than 90 days.
  • Pre-assessment Activities: five weeks of planning/prep (once selected from the service queue)
  • Assessment Duration: two weeks of testing (one week remote and one week onsite)
  • Personnel required to perform assessment: a responsible point of contact to coordinate all customer activity and (minimal) IT support to assist with technical issues such as connectivity, test accounts, etc.
  • Time frame for return of assessment results: 2 weeks

Vulnerability Scanning (formerly known as Cyber Hygiene Scanning) of Internet-accessible systems for known vulnerabilities on a continual basis as a no-cost service. As potential issues are identified, DHS notifies impacted customers so they may proactively mitigate risks to their systems prior to exploitation. The service incentives modern security practices and enables participants to reduce their exposure to exploitable vulnerabilities, which decreases stakeholder risk while increasing the Nation’s overall resiliency.

Deliverables

  • Weekly reports – Vulnerability report detailing current and previously mitigated
  • vulnerabilities, high-risk hosts, and other port, device and network attributes that organisations should examine. The report also provides recommended mitigations for each vulnerability discovered via the scanning process.
  • Special reporting/notices – as certain urgent issues arise, DHS may conduct enhanced or special scans and provide special reports to help customers battle unexpected risks
  • Engineering support – the team provides customer and technical support as needed

Assessment Logistics

  • Execution of a signed vulnerability scanning authorization letter, to include
  • technical points of contact and a list of publicly accessible IPv4 addresses
  • Notice required to schedule assessment: 48 Hours
  • Time needed to complete assessment: Fully-automated; continuous scanning
  • Personnel required to perform assessment: Customer designated Point of Contact and Coordination
  • Time frame for return of assessment results: Weekly delivery; every Monday

The Validated Architecture Design Review (VADR) is a voluntary, no-cost assessment based on standards, guidelines, and best practices. The assessment encompasses architecture and design review, system configuration, log file review, and sophisticated analysis of network traffic to develop a detailed representation of the communications, flows, and relationships between devices and, most importantly, to identify anomalous (and potentially suspicious) communication flows.

Deliverables

  • An in-depth report that provides key discoveries and practical recommendations for improving an organization’s operational maturity and enhancing their cybersecurity posture.

Assessment Logistics

  • Pre-assessment Activities: 2 weeks
  • Time needed to complete assessment: 1 week
  • Personnel required to perform assessment: customer point of contact responsible for coordinating all customer activity and IT staff to answer system and network related questions
  • Time frame for return of assessment results: 6 weeks

Atman Therios Donald Pong

Amet amet, blandit nunc donec. Pretium suspendisse eu tellus tincidunt amet dolor. Senectus mattis sapien enim et lacus elementum lectus purus.
Best-in-class cybersecurity solution for your business.

Entrusted by Leading Brands