Your dedicated team
Humans are critical to interpreting and acting on technology’s advice, which is why they’re a huge part of what we do for you.
Your SOC team includes:
Ensures your systems seamlessly integrate with ours so everything works as it should.
Your eyes and ears. Monitors, analyses and investigates your IT estate 24×7.
Service Delivery Manager
Oversees every element of your service from internal response process to coordination of different teams.
Security Assurance Consultant
Answers the difficult questions and provides valuable guidance that supports your decisions.
Threat Intelligence Specialist
Looks beyond your perimeter to seek and stop cyber threats before they cause harm.
Protective services overview
MDR software agents provide real-time, risk-based prevention of malware and potential network attacks. The MDR service is frequently deployed East-West within a client to support any other complementary North-South IDS/IPS service. Our intuitive Cloud Management Portal enables the management and monitoring of on-premise and mobile users in real-time, as well the granular customisation of alerts and defensive rulesets.
Highly-skilled Threat Hunters proactively seek out anomalies in user and software behaviour to discover zero-day threats as part of 24x7x365 threat monitoring and incident response. A Security Assurance Consultant provides guidance on best practice for monitoring and incident response, while a dedicated Service Delivery Manager ensures expectations and obligations are met.
On-going threat hunting and cyber intelligence monitoring across the internet ensures round the clock threat monitoring, analysis and remediation. The SOC team apply emerging indicators of compromise (IoC’s) rules to transpose the anatomy of attacks into the MDR system to help simultaneously prevent entry and any negative impact. This advanced incident analytics, including malware reversal, keep you protected against any emerging threats, Full insights are also shared as part of a monthly Risk Indicator Report.
Rapid remote deployment of Managed Detection and Response software through cloud management.
Protect key data, intellectual property and client data from theft and accidental leakage.
Detect targeted and sophisticated network attacks.
Flexibility to evolve your service using our ‘Roll Out Roll In’ SOC protections.
Key Risk Indicator and security maturity improvements delivered within 4 weeks of protection deployment.
Harden networks and systems to common network intrusion attacks and malware.
Reduce employee overhead and improve speed of response through automated defence and remediation.
Take the next step
Found the protection for you? Take advantage of our 1-month free pilot and discover the Zepko difference risk-free. Or if you’d simply like to know more about our services, get in touch with our specialist team.
Insurance company protects their Microsoft Exchange servers against the Hafnium group
60 korganisations attacked by Hafnium group
99.9 %customers protected
12 hrsIoC blocking rules applied
21 %average IT budget spent on security
The insurance company was using MS Exchange and were in the process of commencing migration to Office 365. The SOC team notified the client that state sponsored threat actor Hafnium started targeting zero day (previously unknown) vulnerabilities on Exchange servers.
The SOC team applied specific Hafnium Indicator of Compromise (IoC) detection rules to the MDR system. The IoCs covered Hafnium suspicious file creation, Hafnium process spawning and China Chopper. The IoC rules were configured to both detect and prevent execution of the malicious processes.
This gave the organisation protection whilst they commenced a critical patching exercise with guidance from the SOC team. The SOC team used our SIEM to monitor logs from the other systems such as the firewalls to identify any inbound or outbound traffic from malicious IP addresses related to Hafnium (as detected by our GTIN threat intelligence platform).
60,000+ organisations attacked by the Hafnium group
IoC blocking rules applied within 12 hours of notification, whilst clients started the patching process
99.9% of customers protected
The average firm now devotes 21% of its IT budget to cyber security – a jump of 63%
Our customer pledge
We’re confident in the services we provide, and we want you to be too. That’s why we offer the following pledge to every business considering onboarding us as their managed security service provider:
free of charge
Put us to the test and let us run your 24×7 Security Operation Centre for free for the first 3 months. You can benchmark our performance against pre-agreed success criteria – and if you’re not convinced after the pilot, it won’t cost you a penny.
Our mission is to make high-quality, tailored managed security services affordable to the mid-market – and we stand by our word. If you find another provider who can offer a like-for-like SOC service for a lower cost, we will refund the difference.
When you take part in our pilot you can expect the full Zepko service, not a trimmed down version. We’ll run a full 24×7 SOC operation, providing access to our specialist SOC team, process models and procedures, at the same level as our existing customers.
Deploy this protection from £1,833 per month
The above cost has been calculated based on an organisation of 100 users. Larger organisation? As our services are scaled up, your individual protections become more cost effective per user. Speak to us for an accurate quote for your business.