Cyber Security Services
Security is a multi-layer and multi-tool beast, which requires sophisticated threat hunting capabilities, and that’s what we do for you. “Acceptable” and “Compliant” security approaches are leaving companies, large and small, doomed to be the next face of ransomware victimization on the news. Keep reading to learn more, and find out about our trial offering.
Advanced Malware Protection
Traditional anti-virus serves a very necessary purpose, but currently only protects your devices from 8-20% of the threat landscape. Our engineers use EDR and EPP technologies to provide us full insight and real-time threat prevention capabilities, all while having absolutely no access to host files or “spying” capabilities. We simply monitor executables for malicious behaviors and immediately stop payloads from executing and spreading.
Advanced Malware Protection Scope: Laptops, Desktops, VMs, or Servers
Network Log Collection, Analysis, and Threat Hunting
Domain controllers, network firewalls, host-based firewalls, end point protection agents, just to name a few, all collect logs perpetually. Finding that one record or packet which represents a rogue employee or external malicious activity can be a time sink.
Connect all of these devices to our SOC for consolidated analysis, threat hunting, and reporting.
Log collection Scope: Appliances or Software Applications
Vulnerability Identification
If you google the latest Microsoft server patch notes, you will find a list of vulnerabilities which it fixed. While appreciated, Microsoft is also hand delivering malicious actors a spreadsheet of technical and step by step instructions on how to circumvent your network defenses.
Our SOC regularly scans for these as well as a wealth of other known vulnerabilities to ensure you are always protected by the most up to date software.
External Vulnerability Management Scope: External IP Addresses with Services Behind Them
Internal Vulnerability Management Scope: All Internal IP Addresses
Web Application Protection
Public facing web applications often go overlooked in modern security postures. This is a risk Roadmap is not willing to accept on behalf of our clients. In some cases, a 5-minute outage due to cyber manipulation can cause millions in lost revenue, as well as significant loss of personally identifiable information (PII).
To help curve this risk, we utilize a cloud-based Web Application Firewall, paired with Roadmap APIs and custom rule configurations to allow us 24/7 monitoring and threat hunting capabilities.
Web Application Scope: Up to 5 Fully Qualified Domains Included
Incident Response, Security Policy, and Security Procedure Review/Creation
Every security posture needs a custom incident response plan. A well thought out and practiced incident response plan can be the difference between thousands and millions of dollars lost, as well as brand reputation preservation versus destruction.
- Review current security policies to ensure all necessary elements exist
- Review current security procedures to ensure all necessary elements exist
- Review current incident response plans to ensure all necessary elements exist
- Review wire-fraud and other banking related procedures to ensure all necessary elements exist
- Review Communication and coordination efforts to ensure all necessary elements exist
- Review classification of a security incident/breach and notification procedures
Incident Response Procedures Creation Scope: Initial creation, edits and guidance as needed
Are you ready for a reliable IT partner who will join you in the trenches and get it done right?