AEGIS Service Offerings
Essentials | Standard | Advanced | Premium | |
---|---|---|---|---|
Managed Security Risk Program | ✓ | ✓ | ✓ | ✓ |
Full access to Aegis Sentinel SIEM | ✓ | ✓ | ✓ | ✓ |
24 x 7 Real-time SOC monitoring | ✓ | ✓ | ✓ | ✓ |
Advanced Detections | ✓ | ✓ | ✓ | ✓ |
Response and Remediation | ✓ | ✓ | ✓ | ✓ |
Monthly Human Threat Hunting | ✓ | ✓ | ✓ | |
Security Posture Review | ✓ | ✓ | ✓ | |
Nextgen Vulnerability Assessment | ✓ | ✓ | ||
Red Teaming | ✓ |
Managed Security Risk Program
Managed Risk addresses the most critical cybersecurity challenges of undetected risks, too many alerts and limited asset visibility. This is an ongoing process throughout our relationship and serves as the basis of our Aegis service.
Full access to Aegis Sentinel SIEM
You’ll share the same interface with our analysts so there’s never any doubt about what we’re doing on your behalf.
24 x 7 Real-time SOC monitoring
Our analysts investigate threats and flag suspicious or risky activity. We’ll tell you exactly what happened and when, how we detected it and what you need to do about it.
Advanced Detections
Aegis leverages seven proven detection methodologies to find known and unknown attackers across network, user and endpoint layers: threat intelligence, threat hunting, Network Traffic Analysis, Network Flow data, deception technologies, User Behavior Analytics, and Attacker Behavior Analytics.
Monthly Human Threat Hunting
Active human threat hunting finds threats technology alone cannot.
Security Posture Review
Areas of focus include penetration testing, compliance, identity and access management, incident response, contingency planning, configuration management, physical and environmental protection and end-user training. We identify gaps and vulnerabilities and create a recommended remediation roadmap. If required, we can also assess your company’s GDPR exposure.
Nextgen Vulnerability Assessment
Our Next Generation Vulnerability Assessment (NGVA) service utilizes a hybrid approach for conducting vulnerability assessments.
Red Teaming
Red teaming uncovers risks to your organization that traditional penetration tests miss because they focus only on one aspect of security or otherwise narrow scope. Email-based social engineering, network service, application layer, and even physical facility exploitation are just some of the ways we “attack” your IT systems during our red team exercises.
How to get started?
It’s simple. Try our service free for 60 days. We’ll have you direct the security logs from your system current systems to Aegis where we’ll begin monitoring your organization.
During the trial, we will identify and categorize your key risk areas, benchmark your current security posture and identify gaps versus best practices and recommend actions to harden your environment against vulnerabilities.
What if I already have an internal or external security provider?
No problem … use us to benchmark their performance against digital risks across your organization’s environment. We’ll work with them to assess, prioritize and implement improvements to harden your defenses.