For end users who need a comprehensive service to proactively monitor, detect and defend live data breaches and indicators of compromise in real-time. Suitable for users who require assurance to meet audit standards and regulatory regimes.
Service Delivery Manager
Service Assurance Consultant
Threat Intelligence Specialist
The Gold standard, for end users who want to take the service to the next level with the ultimate in Protective monitoring and Incident Response replete with appropriate policy and process creation and maintenance to assist with the demonstration of due diligence to the ICO
For end users who need a comprehensive service to proactively monitor and hunt for threats laterally across all internal network environments to defend against live breaches and indicators of compromise.
The Premium service is also relevant for those industries requiring enhanced levels of regulatory alignment and detailed reporting of risks for their internal audit and external regulatory regimes.
The 2019 Cyber Security Breach Survey says 63% of disruptive breaches were discovered by people not technology.
With in excess of 15 years of combined research and application into machine learning, automated cyber response, working with leading automated machine learning and behavioural profiling technologies, while running a Security Operations Centre – we know what works in real terms and beyond the hype.
In simple terms, our SOC analysts are still our number one asset when it comes to effective incident qualification and response.
It is true that the machine is very powerful at discovering possible indicators of compromise, the “cyber needles in a haystack”. Afterall, we ingest into our monitoring service on average 80M log events per day from each of our clients. Without the machine it would be impossible for our analysts to identify security risks and threats from this much data.
But the human analyst is unmatched at understanding nuance and context behind security alerts. For example, Were those suspicious logins due to a misspelled logon account, was the firewall change approved as part of your CAB process, did Jenny login to her Office 365 account from the Maldives to turn on her out-of-office reply as she is now on holiday and forgot to do it beforehand?
With the human touch, our expert team can quickly close out false positives through correlation with threat intelligence, understanding clearly the context of the log events, putting into focus how your network and business singularly operates, and even reaching out to users directly to confirm irregular behaviour patterns.
Naturally, we don’t stop at detection – fire alarms don’t put out fires , we have a suite of technologies that with analyst oversight, support automated defensive actions from network intrusion prevention to managed detection and response (MDR).
Security Operation Center
Global Threat Intelligence
You will additionally receive an on-call Breach crisis management team to help orchestrate and liaise with various internal and external parties and supply chains to rapidly remediate any outbreak and neutralise the negative impact this may have across the organisation.
Intrinsic within the Premium service is a digital forensics investigation and recovery function should evidence be required for any post-mortem analysis or legal requirement.
End to end responsibility for your architecture and platform roll-out, health and management – to ensure maximum availability
Threat Intelligence Specialist
Using our Cyber threat reseach facility and accessing over 100,000 indicators of compromise containing high quality, relevant and reliable data, the TIS is externally focused – focused on inbound malware analysis, quarantine and removal
The largest virtual team comprising of:
Using the latest EDR and MDR technology integrated into i3 – our Threat Hunters proactively hunt down and contain internal lateral movement of active and emerging threats
highly-skilled with experience gained from working with major SIEM vendors. Responsibility lies with delivering integrated service components for maximum speed to resolution –”find to fix”
Possesses a macro and micro mindset when utilising Threat Intelligence awareness of what can impact customers
Security Assurance Consultant
Provides the best practice security guidance for IT projects as a part of your evolutionary journey – right advice at the right time that incorporates quarterly cyber-security briefings and maturity reviews.
Hold overall responsibility for security policy and process creation and maintenance
Security Delivery Manage
Leads both technical and operational co-ordination and launch of breach and crisis management resources collaboratively leading up-to 15+ client-side teams as a virtual resolver group
Real-time incident management – collection, correlation, triage, investigation, remediation and reporting, delivered by our trained, accredited (ISO27001) and vetted (NPPV3 and SC cleared) staff
Zone 3 - Premium Key Risk Indicator Report
On either a weekly or monthly basis we provide a data-driven report of the Key Risk Indicators across your estate.
These are presented in an easy-to-digest series of graphical summary dashboards.
Additionally, we continue to track and trace existing incidents in progress where strategic, longer term solutions may be required together with a wider-ranging collaboration of IT teams and stakeholders.
The report also shown where we have considered Threat Intelligence advisories and how they may impact your IT operation.
The KRI report will also detail all investigated security risks within their specific cyber classifications.
To receive your free example report complete your details today
31 Chertsey Street
11th Floor Centre City Tower
5-7 Hill Street