Managed Endpoint Defence Service

DEFENDING YOUR SYSTEMS AND SENSITIVE INFORMATION AT YOUR ENDPOINTS


End the Threat at the Endpoint


A comprehensive, well-managed cyber defence strategy deployed at endpoints provides organizations with peace of mind that their business systems and sensitive information are protected from adversaries who routinely bypass parameter controls.

CyberStash effectively reduces an organization’s exposure to cyber risks by leveraging a comprehensive defence-in-depth approach to endpoint protection that shields against threats before they cause business impact. CyberStash provides additional cyber security assurance with the ability to detect, investigate, and respond to potential security threats targeting endpoints by offering a comprehensive level of management and support.

Download the datasheet, request a quote or contact us for additional information: Contact Us

BUSINESS CONTEXT


At any point in time, dozens of internal systems display signs of malware and suspicious behaviour. Following best practice, security teams would have these machines investigated, and if found infected, rebuilt – assuming, of course, that the system compromise is detected. The effort of investigating and rebuilding infected systems and the resulting loss in productivity needs to be avoided or at least minimized to reduce risk and optimize business resources. Furthermore, the root cause of incidents must be effectively determined to advance future defence strategies.

First-generation anti-virus applications are shown to prevent at best 50% of all known malware and are incapable of preventing exploits, ransomware or fileless attacks. However, advanced endpoint defence applications are shown to prevent above 95% of all known malware and:

  • Include exploit, ransomware, and fileless attack protection.

  • Detect numerous other advanced threats that can then be responded to in a timely manner.

  • Provide capabilities to discover and investigate artefacts that help determine the root-cause of incidents.

  • An organization that depends on perimeter security controls and on first-generation anti-virus applications, is incapable of detecting a large subset of advanced threats in their environment. This naturally poses a high risk to organizations because if left unmanaged, they can expect to eventually experience malware outbreaks and sensitive data loss leading to business impact or legal implications. To reduce business risk to an acceptable level, organizations must upgrade their protective and detective capabilities on all endpoints and be able to respond swiftly to threats by containing them in a timely manner.

    SERVICE BENEFITS


    The CyberStash Endpoint Defence Service delivers an end-to-end outcome for organizations seeking to either self-service, co-manage, or completely outsource the effort.

    Security

    Confidently report on your security posture at any given moment
    Detect attacks

    Detect attacks that have gone unnoticed
    Scope and impact of an incident

    Understand the scope and impact of an incident
    Investigate attacks

    Investigate attacks that are tagged as suspicious
    Conduct analysis

    Conduct analysis by replicating capabilities associated with hard-to-find analysts
    Respond faster to potential incidents

    Respond faster to potential incidents

    OUR SOLUTION


    To optimize risk and resources, CyberStash is offering two service levels to cover client needs. Both our Foundation and Enterprise service levels provide the full spectrum of protection and detection capabilities using the world-leading Sophos Intercept X Endpoint Defence Agent deployed on all endpoints across the enterprise and managed through our cloud-based SaaS platform

    CyberStash works closely with clients to establish appropriate policies that minimize risk while accounting for the organization’s security architecture and risk appetite.

    Periodic investigation of triggered alerts is provided followed by actionable responses to maintain the risk and health of our clients’ environment.

    Clients are also able to raise service requests with CyberStash to ensure critical incidents are responded to in a timely manner to reduce business impact.

    The Enterprise service level additionally provides root-cause analysis of confirmed breaches and monthly reporting that demonstrates trends in risks, service effectiveness and service health across the enterprise.

    Clients can also select from 3 Service Options that increase the value of the service for their organization including the Security Assurance Service Option that validates the effectiveness of defensive controls through forensicstate analysis.

    SERVICE DELIVERY


    Security breaches can be catastrophic for enterprises. Defending enterprises from cyberattacks requires a comprehensive endpoint detection and response (EDR) solution that offers full-stack 360-degree visibility into all their endpoints.

    The CyberStash service leverages industry-aligned best practices, and our consultants engage with your team to help design and document the service architecture in order to optimize risk and resources. We back up the service with 24-hour SLAs for Critical threats that target endpoints with a less than 1% false positive rate for breach identification.


    Managed Endpoint Defence Service

    DID YOU KNOW?


    In March 2019, © NSSLabs field tested the effectiveness of Advanced Endpoint Protection products from leading vendors and concluded that Sophos Intercept X Advanced was the most effective solution?


    You can review the results here:

    https://www.nsslabs.com/adva nced-endpoint-protection-aepsecurity-value-map


    ITIL Aligned Service Management


    Service Level Reporting

    SERVICE LEVEL REPORTING & MEETINGS
    Dashboard with Delegated Administration

    DASHBOARDS WITH DELEGATED ADMINISTRATION
    Configuration Management

    CHANGE AND CONFIGURATION MANAGEMENT
    Incident and Problem Management

    INCIDENT AND PROBLEM MANAGEMENT
    Upgrades and Release Management

    UPGRADES AND RELEASE MANAGEMENT
    Service Level Account Management

    SERVICE LEVEL ACCOUNT MANAGEMENT