4
Cyber threats are constantly evolving. CalTech’s OneDefense is an integrated approach specifically developed to dynamically keep your organization safe from attackers. Always protect what’s yours. A Different Kind of Cyber Solution OneDefense is not a static solution. It’s a dynamic approach to always secure your organization from cyber threats. Embraces a comprehensive strategic framework for addressing potential threats Spans the spectrum of prevention of and reaction to potential threats Prioritizes the extent to which cybersecurity is considered in broader risk management decisions Incorporates emerging vulnerability information into its approach R E C O V E R I D E N T I FY P R O T E C T D E T E C T R E S P O N D Exceptional IT. Real People. Bigger Purpose. www.CalTech.com 877-223-6401

A Different Kind of Cyber Solution

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Different Kind of Cyber Solution

Cyber threats are constantly evolving. CalTech’s OneDefense is an integrated approach specifically developed to dynamically keep your organization safe from attackers.

Always protect what’s yours.

A Different Kind of Cyber Solution

OneDefense is not a static solution. It’s a dynamic approach to always secure your organization from cyber threats.

Embraces a comprehensive strategicframework for addressing potential threats

Spans the spectrum of prevention of andreaction to potential threats

Prioritizes the extent to which cybersecurity is considered in broader risk management decisions

Incorporates emerging vulnerabilityinformation into its approach

RE

COVER IDENTIFY

PRO

TE

CT

D E T E C T

RE

SP

ON

D

Exceptional IT. Real People. Bigger Purpose. www.CalTech.com 877-223-6401

Page 2: A Different Kind of Cyber Solution

OneDefense is designed to protect and prevent in all areas of your infrastructure at a cost-effective scale not otherwise afforded.

Systems, Expertise, and Strategic Execution

Integrated security software and appliances constantly monitor and protect what’s yours.

Applied Systems

A dedicated team of cybersecurity experts tunes, monitors, and responds to

threats in your environment.

Visionary Expertise

Practices and protocols in step with industry

guidelines and frameworks to keep you safer.

Strategic Execution

Exceptional IT. Real People. Bigger Purpose.

Security-first approach to configuration, management,

and reporting

Cloud Security

Event correlation and alerting, firewall

monitoring, and intrusion detection

Network Security

Behavior-based suite that includes intrusion prevention and ransomware protection

WorkstationsEmail spam / phishing filter, spoof prevention,

and encryption

Mail Protections

Identifying and securing common attack vectors,

gaps, and missing patches

Vulnerability ManagementThreat intelligence, incident response

containment, and audit management

Security Operations Center

Visionary ExpertiseApplications, systems, and

human intelligence to proactively

secure your entire infrastructure

Page 3: A Different Kind of Cyber Solution

Features

Applied Systems

Complete workstation protection — web, antimalware, and email. Intrusion detection and prevention, plus real-time security event management

Targeted threat hunting, incident response, and advanced system hardening

Continuous 24/7/365 monitoring by a dedicated team of Security Operations Center specialists

Everything in Core, plus security awareness training and education, email sender verification, and password manager

Everything in Core, plus customized, curated security awareness training guided by cybersecurity experts

Everything in Core, plus fully automated tactical training for your staff

Everything in Core and Pro, plus an advanced vulnerability management solution and integrated threat intel from the Financial Services Information Sharing and Analysis Center

Everything in Core and Pro, plus audit management and remediation tracking, ongoing monitoring and reporting for email threats, and support for the Cybersecurity Assessment Tool

Everything in Core and Pro, plus annual policy and procedure reviews and simulated crisis exercises to test your internet recovery and business continuity

Visionary Expertise

Strategic Execution

SM SM SM

OneDefense is comprehensive yet adapted to address your cybersecurity risk levels and readiness.

Scaled and Assembled to Your Needs

www.CalTech.com 877-223-6401

Page 4: A Different Kind of Cyber Solution

• Email encryption • Patch management • Multifactor authenticator • Endpoint policy compliance • Company data isolation

on employee-owned devices (with Intune)

• Conditional access management• Mobile device management —

policy enforcement and data protection (for company- and employee-owned devices)

• Email data loss prevention features• *Quarterly end-user security

awareness training• *Password management• *SPF, DMARC, and DKIM

deployment• **Annual cybersecurity

tabletop exercise• **Cybersecurity policy

and procedures

DETECT• Cross-platform security event

reporting/alerting• Microsoft 365 suspicious

login alerting• Real-time endpoint intrusion

detection and prevention• Cross-platform managed

detection (by a 24/7/365 Security Operations Center)

• Event correlation across endpoints and the network

Exceptional IT. Real People. Bigger Purpose. www.CalTech.com 877-223-6401

Technical Scope

IDENTIFY• Integrated threat intel• Microsoft 365 new feature

and security review• Microsoft 365 best practices for

data management• Deep asset discovery • Risk assessement of assets• Data backup reporting• Patch management reporting• Microsoft 365 security scoring

and review• *Monthly end-user phishing testing• *Organization and employee

phish-prone benchmarking• *Executive and board-level

security reporting• **Audit/Exam remediation

management• **Support for the Cybersecurity

Assessment Tool / Ransomware Assessment Tool

• ** Financial Services Information Sharing and Analysis Center threat intelligence (membership required)

PROTECT• Endpoint protection • Web threat protection• Email spoofing, phishing,

and spam prevention • Email retention

• User risk analytics, monthly vulnerability scans, internal and external

• Active DMARC monitoring and reporting

• ** Active SPF management

RESPOND• Incident response containment• Custom incident response

actions based on our playbook• Targeted threat hunting• *CalTech Security Operations

Center phish analysis and response

RECOVER• EverSpaceSM Protect• Secure off site, air-gapped• Disaster recovery with a 24-

hour recovery time objective• Encrypted backup

* OneDefense Pro and Premium **OneDefense Premium only

Due to the dynamic and evolutionary nature of OneDefense, items listed in the technical scope are subject to change.

RE

COVER IDENTIFY

PRO

TE

CT

D E T E C T

RE

SP

ON

D