About service

24/7 detection and verification (confirmation) of cyber security incidents in the customer's infrastructure, investigation and response. 

The service is provided using a consistent stack of software products from IRP, SIEM and EDR class solutions that help to build flexible processes of cyber security incident management, automate routine tasks of analysts, collect and analyze an exhaustive amount of telemetry from end hosts beyond the standard capabilities of auditing operating systems, as well as from protection systems used by the customer and own custom-built services, and respond to cyber security incidents. 

Machine learning models (neural networks) with a constantly evolving set of scenarios are used to automate and improve the accuracy of malicious activity detection. 


Best solution if

1

24/7 detection, investigation and response to cyber security incidents is required

2

Basic security protection and controls are in place (directory service, anti-virus, email filtering, firewalls)

3

Building internal SecOps processes is not economically feasible or there is a lack of relevant resources

We offer:

Guaranteed service level with transparent SLA and financial responsibility for its violation;

Licenses for IRP, SIEM and EDR are included in the price, systems access is provided to customers;

Constantly updated and renewable content base (correlation rules, IOC, IOA, security feeds, etc.) and built TI processes on our side;

Service provision using software products included in the Unified Register of Russian Programs and certified by Russian FEDERAL SERVICE FOR TECHNICAL CONTROL (meaning that there are no undocumented features);

Various levels of service and architecture depending on the customer's needs.

How it works:

1

Surveying existing infrastructure

2

Deploying software products, configuring protection systems and installing EDR agents

3

Content settings (rules, dashboards, etc.)

4

Service launch

Try it out

Let’s talk how to improve the security and efficiency of your IT and cyber security systems.