1
Contact All Covered Toll-Free Nationwide at 866-446-1133 or visit www.AllCovered.com SECURITY AWARENESS TRAINING 1 Full Managed Security Awareness Training includes: • Web-based training • Phishing testing • Security “hint & tips” • Training campaigns • Reporting (measuring progress) VULNERABILITY MANAGEMENT 2 IDENTIFICATION Asset Discovery Scan • Authenticated • Entire environment CLASSIFICATION All Discovered Assets • Asset tagging • Remediation groups • Entire environment REMEDIATION Patching and Configuration • Applying patches • Hardening configuration • Removing applications • Risk acceptance process SECURITY MONITORING 3 3 PILLARS OF SECURITY (SIEM) SECURITY INFORMATION EVENT MANAGEMENT • 24X7 monitoring for security breaches • 12 month log retention included • Incident response initiation • Machine learning • User behavior analytics SIEM AND SOC SERVICES • Respond to cybersecurity threats quickly • Threat hunting • Comply with regulatory requirements • Fully managed by All Covered

OF SECURITY · 1/3/2020  · security breaches • 12 month log retention included • Incident response initiation • Machine learning • User behavior analytics SIEM AND SOC SERVICES

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OF SECURITY · 1/3/2020  · security breaches • 12 month log retention included • Incident response initiation • Machine learning • User behavior analytics SIEM AND SOC SERVICES

Contact All Covered Toll-Free Nationwide at 866-446-1133 or visit www.AllCovered.com

SECURITY AWARENESS TRAINING1Full Managed Security Awareness Training includes: • Web-based training• Phishing testing• Security “hint & tips” • Training campaigns• Reporting

(measuring progress)

VULNERABILITY MANAGEMENT2

IDENTIFICATIONAsset Discovery Scan• Authenticated • Entire environment

CLASSIFICATIONAll Discovered Assets• Asset tagging• Remediation groups• Entire environment

REMEDIATIONPatching and Configuration• Applying patches• Hardening configuration• Removing applications• Risk acceptance process

SECURITY MONITORING

3

3PILLARSOF SECURITY

(SIEM) SECURITY INFORMATION EVENT MANAGEMENT• 24X7 monitoring for

security breaches• 12 month log retention

included• Incident response initiation • Machine learning• User behavior analytics

SIEM AND SOC SERVICES• Respond to cybersecurity

threats quickly • Threat hunting• Comply with regulatory

requirements• Fully managed by All Covered