APPENDIX C

STANDARD NETWORK SECURITY SERVICE

Next-Gen AI Powered Endpoint Protection and Monitoring

  • Description: Advanced endpoint security using AI to detect and respond to threats in real-time.

Multi-Factor Authentication (MFA)

  • Description: Enhances security by requiring multiple forms of verification to access resources.

Mobile Device Security and Management

  • Description: Provides comprehensive management and security for mobile devices accessing corporate systems.

Password Manager

  • Description: Securely stores and manages encrypted passwords for streamlined access.

Browser Security

  • Description: Safeguards users from malicious websites and online threats through tools and plugins.

DNS Protection

  • Description: Filters and blocks malicious DNS requests to protect users from phishing and malware.

Cyber Security Awareness Training

  • Description: Educates employees on recognizing and preventing cyber threats through tailored training programs.

Domain Management and Protection

  • Description: Manages and secures domain registrations and transactions, ensuring continuity and protection.

VPN (Virtual Private Network)

  • Description: Securely connects remote users and offices to business applications and resources.

Anti-Spam and Phishing

  • Description: Filters spam and phishing emails to reduce email-based attack risks.

Email Archiving with E-Discovery

  • Description: Provides secure email storage for easy retrieval and legal compliance.

Disk Encryption of Workstations

  • Description: Encrypts workstation hard drives to prevent unauthorized data access.

Workstation Backups

  • Description: Ensures data integrity with regularly scheduled and managed workstation backups.

Standard Identity and Access Management

  • Description: Secures access and transactions with enhanced identity verification and management services.

Elevated User Access

  • Description: Monitors and controls access to critical systems and data for privileged users.

Dark Web Monitoring

  • Description: Scans the dark web for sensitive organizational data, providing alerts and proactive security measures.

DMARC, SPF, and DKIM Management

  • Description: Configures and manages email authentication protocols to enhance security and prevent spoofing.

Phishing Simulation

  • Description: Conducts phishing attack simulations to identify vulnerabilities and refine training programs.

End-to-end Email Encryption

  • Description: Encrypts emails from sender to recipient to ensure the privacy and integrity of communications.

SaaS Monitoring

  • Description: Continuous monitoring and management of SaaS applications to ensure security compliance, detect data breaches, and prevent unauthorized access.
    • Note: While we strive to provide comprehensive coverage, please be aware that not all SaaS applications may be compatible with this monitoring service. The scope of monitoring is dependent on the level of access provided by the SaaS vendor and the technical compatibility with our monitoring tools. We recommend consulting with our team to identify which of your SaaS applications can be effectively monitored under this service.

SOC 24 x 7 Realtime Monitoring & Response

  • Description: Provides continuous monitoring of your networks, detecting, analyzing, and responding to cybersecurity incidents and anomalies in real time.
    • Active Threat Hunting: Proactively searches within network traffic and system logs to identify and isolate advanced threats before they can manifest into actual breaches.
    • Security Threat Detection and Remediation: Employs advanced detection tools and response protocols to address and neutralize threats as they are identified, ensuring swift remediation and minimizing potential impacts.

Managed Detection and Response (MDR)

  • Description: This service extends beyond traditional monitoring to include proactive threat hunting, advanced detection capabilities, and rapid incident response. MDR is designed to identify and mitigate sophisticated cyber threats that may bypass conventional security measures.
    • Key Features:
    • 24/7 Threat Monitoring and Detection: Continuous oversight of your network to detect malicious activities and anomalies.
    • Proactive Threat Hunting: Actively searching for advanced threats within the environment.
    • Rapid Response and Remediation: Quick and effective response to threats with actions to contain and neutralize them before they cause significant damage.
    • Expert Guidance and Support: Access to cybersecurity experts who can provide insights and recommendations for strengthening your security posture.
    • Integrated with SOC: Seamless integration with SOC operations to enhance visibility and coordination of security efforts.