Security

If you could decide now…

BEFORE you have a security event…

What is the most IMPORTANT thing you need?

Where

 How to Recover

Backups

People

Tools

Operating Systems supported by Carbon Black.

  • Windows 7/8/10
  • Windows Server 2008/2012/2016
  • MacOS
  • RHEL/CentOS
  • Ubuntu
  • SUSE
  • Amazon Linux

Phase 1

Discovery / Detection / Announcement – You’ve been hit…

  • What’s your exposure?
  • Worse case? What are your options?
  • How did you find out?

Phase 2

Who Has the Ball?

  • Unity of Command. (Step on each other)

Phase 3

Preliminary Evaluation / MACRO  –  How bad is it?

  • Magnitude of attack?
  • Attack vector (How did they get in?)
  • Worse case exposure

Phase 04

The Prevention & Hardening of Reattack

  • The Environment

Phase 5

Recover / Assets / Limitations  –  What are my options?

  • Back-ups/strategies/asssets
  • Cloud
  • Endpoints
  • DR

Phase 6

Recovery

  • Cybersecurity Response plan

Phase 7

When the Dust Settles (Forensics)

  • Forensic & future testing

Phase 8

Ongoing Prevention

  • If you’re not evaluating your posture, you’re doing it wrong

Cybersecurity

Not all MSPs are created equal

ServIT seeks to be the highest-value managed service provider on the planet. NO MSP has the knowledge, skills, and experience required to specialize in Cybersecurity / SOC (Security Operations Center) — this is a highly-specialized, mission-critical field that stands on its own.

ServIT has searched the globe to find the best cybersecurity experts in the world to support our valued clients. We found them. And, we are proud to offer the world’s first smart SOC as a Service.

  • Cybersecurity Assessment
  • Security Readiness Assessment
  • Hacking Simulations
  • Compliance Audit
  • Monitoring, Remediation, & Investigation

Our SOC as a Service offering is designed, executed, and operated by elite cybersecurity experts with both nation-state and corporate-level expertise. Our team will allow you to grow your business while keeping a secure working environment. As we are enhancing your cybersecurity defense capabilities, we will act as an extension to your security team.

Security Operations

Not all security operations centers are the same

In general, there are four tiers of SOC services each having vital functions. However, as a rule, they all have two common foundations with security monitoring tools to receive contextually relevant information from both inside and outside the network (e.g., persistent outbound data transfers, login/ logoff, firewall activity, etc.). In addition, these systems monitor cloud and on-premise infrastructure services like DNS, email, web, domain controllers, and active directory services.

Tier 1-3 SOCs focus on the tactical activities of managing an SOC either defensively (Tier 1-2), or proactively hunting threats (Tier 3). At this level, the service provider typically oversees all aspects of a proactive – threat hunter – SOC operation. This includes managing incident response programs, escalation processes, and developing the crisis communications plan across the organization. Tier 4 SOCs produce, report, and maintain performance metrics to protect their customer’s executives, brands, and reputations.