There are at least three core reasons as to why IT security has moved from vague concern for businesses in certain sectors or with a particularly complex IT infrastructure, to a centralised issue for all organisations.
First, the cyber threat landscape has evolved – and continues to evolve – dramatically and dynamically. A recent McAfee survey estimates that cyber-crime is costing the global economy as much as $600 billion annually and with new threats emerging all the time, security isn’t something you can cut corners with.
Second, even the smallest organisations are operating increasingly complex IT infrastructures, with large numbers of applications and endpoint devices to protect, and new users and devices continually being added.
Third, the wider regulatory and legal landscapes governing organisations’ IT security are increasingly demanding. Typically, the requirements of such regulations are twofold: they require specific security standards and protocols to be implemented; and they require accurate audit trails demonstrating those standards and protocols.
You need to protect your organisation with proactive 24x7 monitoring, detection and response. And this needs to be delivered within the confines of a limited budget and an increasingly small pool of talent. The boardroom question is: how cost-effectively can these needs be met?
The best way to achieve this successfully and affordably is through an Adept4 managed security service.
Adept4 has a portfolio of security products and services that, combined into a multi-layered approach, provide the best protection for your business. Tailored to your organisation’s size, structure and business needs we manage and maintain the service for you, so you have total peace of mind.
All our managed security services include:
The first layer of our managed security services solution is the firewall. It protects the perimeter of your organisation’s network at the point it meets the internet. The Protect Perimeter service is monitored and updated 24/7 via the Adept4 Security Operations Centre (SOC). It protects your key information assets across networks, hosts, applications, and databases and filters out traffic that contravenes your security policy.
Additionally, Adept4 uses Security Information and Event Management (SIEM) based technology to identify suspicious or anomalous events referred to as use cases. Firewall use cases consider aggregated event logs to analyse the millions of logs to spot trends or activity that could lead to a breach.
The Adept Protect Secure managed security service builds upon the Adept Protect Perimeter service by adding Unified Threat Management (UTM) to the firewall. The UTM provides customers with advanced threat prevention technologies to protect critical applications, data centres and internal systems.
A typical UTM device provides the following features:
• Advanced firewall and VPN capabilities
• Application based firewall policies – next generation application specific firewall policies
• User based firewall policies – next generation user specific firewall policies
• Web filtering proxy – blocking users from accessing web resources that contravene policy, host malicious software or deliver malware
• Intrusion prevention system – monitoring all network traffic to detect and block known attack patterns
• Sandboxing – protection against advanced persistent threats (APTs), by executing all inbound code and looking for malicious activity
• Threat intelligence – blocking users and systems from communicating with Internet systems that appear on vendor’s threat intelligence lists.
• Data loss prevention – ability to look for documents being sent out of the organisation that contravenes security and privacy policies.
The Adept4 managed email security gateway service ensures that your email gateway technologies are monitored and managed effectively. Providing continued protection from information leakage and from viruses, spam, trojans, spyware, and malicious code distributed via email.
Nyotron has developed an Endpoint solution that defends against cyber-threats regardless of type and regardless of how the threat gains access to the network. Since Nyotron protects the actual data using OS centric positive security, we use this solution in our security stack as a last line of defence.
Once a breach occurs there are only a handful of actions that can damage the data. These include ex-filtration, deletion, encryption or amendment. The Nyotron product has mapped all the legitimate ways of carrying out potentially damaging actions and uses Behaviour
Pattern Mapping (BPM) to analyse system calls before they are executed, detecting whether that call presents behaviour that is not normative. Once a threat tries to use a method that does not adhere to an acceptable route, the action is blocked and neutralised. We are Nyotron's preferred partner in Europe.
Adept4 Protect Cloud, provides customers with the protection of an industry leading CASB (Cloud Access Security Broker) solution that is positioned between the LAN and the Egress point and monitors for cloud application usage. By limiting cloud applications by risk of use, ownership, criteria and control, they can be protected from being leaked to outside cloud storage locations. Click here to read our insight guide on the ten steps necessary to secure the cloud.
Security solutions from Adept4 are supported by our 24x7x365 Security Operations Centre (SOC) that monitors customer event logs against best practice security use cases in order to identify anomalous and suspicious traffic. These use cases are critical in the further protection of the network as we consider logs from multiple devices and use an aggregation and correlation engine to spot trends and activity that point to potential breaches.
Security is more than deploying solutions, it is interrogating the information, analysing the activity, considering behaviour and wrapping awareness to provide intelligent alerting that seeks to provide early warning signals that a security event is about to happen.
SIEM (Security Information and Event Management) is all about the use case and the actionable intelligence that can be ascertained when linking multiple devices together. Our SIEM service wrap delivers rapid response alerting, so that mitigation actions can take place.
SIEM solutions are typically expensive with heavy upfront investment, as licensing is based upon the ingestion of event logs. This is not the case with the Adept4 model since it is provided as a service and is use case focussed rather than ingestion. The result is a more cost effective and relevant SIEM solution for your business.
Security ratings are an effective way of quickly identifying changes to the security posture. Taking information from various sources, valuations feedback into an overall number that is representative of a customer security level. The managed service wrap from Adept4 monitors these alterations closely and feedbacks recommendations and actions where changes occur, alongside proactive suggestions on how to improve the ratings for greater assurance.