As part of our Managed Services, we help you to reliably identify highly complex attacks. We keep you well informed thanks to superior sensors and comprehensive analysis by our SOC analysts.
Thanks to community insights, our own threat intelligence, and commercial and open sources of information, we know what to look for.
We work towards full, continuous visibility through network-based sensors installed at central points and the enrichment of relevant metadata.
Our analysts check, classify, evaluate, and eliminate false positives and keep you in-formed in the event of an incident.
Armed with a comprehensive set of indicators and rules, we recognise attacks at an early stage. We do not just rely on open source and commercial partners. Rather, we enrich that information with knowledge from our own threat intelligence and information provided by the DCSO community and our network.
Best possible visibility and transparency
Corporate networks are constantly the focus of professional attackers seeking to commit industrial espionage or sabotage. In order to defend your resources successfully, you need to ensure the visibility of your own data traffic and detect movement between infected systems (lateral movement). These are decisive factors.
We inform you in the case of an incident
Relieve strain on your SOC (Security Operations Centre) with our Managed Security Service and a superior sensor system installed at central nodes of the network infrastructure. We lay the groundwork to make sure that the relevant data traffic remains transparent. If an alarm is triggered, our analyst backend evaluates and filters false alarms, rates the criticality and urgency of the alarm, and generates a comprehensive report. That way, you can stay best informed about specific observations and affected systems and receive appropriate recommendations for action.
- Curated security content
- Indicators and rules from various sources (e.g., DCSO threat intelligence, communities, OSINT, and federal)
- Suricata-based sensors
- Operation, monitoring, and maintenance
- Assistance with deployment and baselining
- Analysis and validation of alarms
- Issuing of alerts, advice, and recommendations for checking and troubleshooting
Stay on top of your digital footprint
Our solution offers two use cases, which function independently of each other and which complement each other perfectly. We offer them to you as fully managed services:
Information leakage monitoring
We search all corners of the Internet for leaked, publicly accessible files and thus prevent your data from getting into the wrong hands. Regardless of whether it is contracts, construction plans, confidential agree-ments, etc., if your documents fall into the wrong hands, it can present a dire threat to your company. Thanks to our unique technical capabilities and our SOC analysts, we report only relevant results to you in comprehensive, enriched reports so that you can concentrate on your essential core business.
Identity leakage monitoring
Our Account Takeover Prevention solution allows us to discover your company’s compromised credentials & PII. Our SOC analysts provide you with a full picture of your current data breaches using HUMINT (Hu-man Intelligence) and support you with a comprehensive analysis and enrichment of the compromised data so that you can react before possible attackers break into your networks.
In good time
Get access to leaked data before it becomes a problem thanks to our unique information gathering method.
Quickly understand the extent and impact of an alert based on contextual information, data completeness, and information enrichment.
Efficiently determine your damage control priorities through tailored alerts with precise risk analysis and suggestions for troubleshooting.