Threat Management Services:
An intelligent, integrated unified threat management approach can help you detect advanced threats, quickly respond with accuracy, and recover from disruptions. Too often, an uncoordinated collection of threat management tools built over time fails to deliver a comprehensive view that delivers secure operations.
activeDEFENCE® threat management services give your organisation access to thousands of global researchers, developers, analysts and SOC personnel for market-leading protection of your most critical assets.
With event enrichment, automated analysis and orchestration, enabling rapid threat response, powered by our SIEM and SOAR. Our technology and partners help ensure your threat management solution delivers on all fronts. Respond from a mobile app with industry-leading service-level agreements, getting the information you need when you need it.
Penetration Testing Services:
Aligned to industry standards and compliant with regulatory requirements including PCIDSS 11.3. Primary objectives of the service are to uncover vulnerabilities residing in IT systems, applications or network components and attempting to exploit them to obtain access to sensitive information. Objective-based Penetration Testing challenges the industry standard – using a unique three-pronged approach to assess people, process, and technology. Our security testing methodology is derived from the OWASP Top 10:2017 and has been enhanced with current threats and our overall experience in the industry. Our methodology is comprehensive and has been broken up based on which areas can be tested with automation and those which require extensive manual testing.
Objective-based Penetration Testing
- Penetration Testing, Application
- Security Testing
- Wireless Penetration Testing
- E-mail Phishing,
- Device Planting/Lost USBs
- Lateral Movement Attacks
- Reporting & Retesting
- Active Threat Assessment (endpoint count dependent)
- Incident Response Plan Development – High Level/Full
Phishing Prevention and Defence Services:
The service provides comprehensive email phishing simulation designed to change behaviour and enable employees to recognise and report phishing emails. This immersive service incorporates real-world simulations for hands-on experience with safe examples combined with on-the-spot education. Your inhouse IT resources stretched?
ProtectCyber® Triage Service:
With millions of phishing emails sent daily, it is no surprise there are new and increasingly damaging attacks regularly making headlines. For a typical organisation, it can take between 10 to 45 minutes to manually triage just one of these suspected emails. Our Security Operations analysts provide the investigation and quarantine of such emails to reduce mean time to resolution, consistently execute incident response, and reduce human error. Using credible human-verified phishing intelligence, not only can our security analysts quickly determine what is a threat, but also have access to contextual reports to understand why an indicator is a threat along with the linkage between the attacker’s infrastructures.
Dark Web Reporting Services:
Combining credible human-verified and sophisticated Dark Web intelligence with search capabilities to identify, analyze, and proactively monitor for an organisation’s compromised or stolen employee and customer data. Real-time notification and actionable reporting.