- Advanced Patch Management
- Vulnerability Management
- Application Whitelisting
- Advanced Threat Protection for Email and Endpoints
- Threat Hunting and Intelligence
Patch Management: Management of OS patching, remediation of missed patches, and installation of out of band critical security patches. Keeping within a supported version of OS.
Vulnerability Management:Management of hardware and software-based vulnerabilities. Includes installation of patches, firmware updates and software updates. Deploying vendor approved mitigations. Daily or Weekly vulnerability scanning.
Security Baselining/Policy Review: Bi-Annual review of security policies. Deploying, configuring and maintaining vendor approved security baselines.
Threat Intelligence:Leverage threat intelligence feeds to mitigate zero-day vulnerabilities. Includes Threat hunting for known vulnerabilities.
Identity Protection: Security policies and services to mitigate account compromise. Includes MFA, behavioural and machine learning analysis. Alerting and logging.
Asset Management:Policies and services to manage the fleet of devices. Scanning for unknown devices. Deployment and management of corporate devices.
Application Whitelisting:Restrict running of applications, scripts and other executables to an approved set only.
Advanced Threat Protection for Email: Protects email and from zero-day malware, phish and business email compromise. Post-breach investigation, hunting, and response
Cyber Security score/report card:Monthly report on current cyber security posture. Provides recommendations to improve security score.
Advanced Threat protection for endpoints:Includes endpoint detection and response tool set. Monitoring and alerting for threats on the endpoints
Backup Management: Monitoring of backup status and remediation of failed backups.