Managed Security Services Provider MSSP

Cybersecurity Information Security Services

Managed Security Services

Implement a comprehensive security monitoring and management platform utilizing industry leading technology administered by cybersecurity experts.  TCDI’s managed security services are a set of key security solutions that are offered on a subscription basis.  The portfolio of services includes security testing, event monitoring, security platform, and malware protection.

Managed Security Testing – Vulnerability Management and Penetration Testing

Vulnerability scanning is the process of analyzing software versions and configuration settings, usually through an automated tool, to discover weaknesses.  TCDI will scan client networks monthly and deliver a list of vulnerabilities and remediation actions.  Vulnerability scanning can be performed externally to test a client’s Internet facing servers or internally to test workstations and servers inside the organization.

A Pen Test is a simulated cyber-attack that offers unparalleled insight into an organization’s data security effectiveness.  During the test, security vulnerabilities are identified and attempts are made to compromise systems and gain unauthorized access to data.  At the conclusion of the test, TCDI provides a written report summarizing the vulnerabilities identified, threat level, and suggested remediation steps.

Managed security testing includes a combination of vulnerability scanning and penetration testing to provide insight into the realistic threats to your business. Testing is performed on a scheduled basis throughout the year, and the most common plan includes monthly vulnerability scanning and quarterly penetration testing. External security testing is performed completely from TCDI’s secure penetration testing cloud, and internal security testing is performed via a small testing device that is attached to the corporate network.

Key benefits:

  • Identify existing exploitable security weaknesses
  • Meet PCI, HIPAA, GDPR, and other compliance requirements for vulnerability scanning and penetration testing
  • Improve overall security presence

Managed Security Event Monitoring

The security event management and incident response service collects logs from client devices including servers, switches, routers, firewalls, and storage devices and analyzes those logs for security events.  Events from each log are correlated to identify threats that each log independently could not provide.

Security analysts in TCDI’s security operations center keep tabs on the client network and provide 24/7 alerting and guidance when security events require action. Key benefits include:

  • Real time awareness of security threats
  • An experienced incident response and threat hunting team on call with the threat information at hand
  • Reduce overhead and free up IT resources
  • Improve overall security presence

Managed Security Platform

Security platform management is complex to implement and manage correctly. It is not something that can simply be placed on auto-pilot.

Managed platform services include:

  • Firewalls
  • Unified Threat Management (UTM)
  • Intrusion Detection System (IDS) / Intrusion Prevention System (IPS)
  • Virtual Private Network (VPN)
  • Load Balancing and Proxy
  • Identify and Access Management (IAM)
  • Data Loss Prevention (DLP)
  • Certificate, Key, and Encryption Management

This is where managed platform services step in. TCDI provides initial configuration of devices, monitoring of security alerts and device health, patch management, and configuration management. When implemented alongside TCDI’s security event management services, platform information is correlated with related information from domain controllers, end user machines, VPN servers, web services, and other network systems to identify threats quickly and efficiently.

Key benefits:

  • Assurance that platform rule sets and change management are implemented appropriately
  • Integrate best practices, eliminate redundancies, and improve effectiveness of security platforms
  • Reduce overhead and free up IT resources
  • Improve overall security presence
  • Meet PCI, HIPAA, GDPR, and other compliance requirements for perimeter defense

Managed Malware Protection

Malware is one of the primary ways attackers breach corporate networks and is often distributed through phishing messages or installed through malicious online ads or links. The consequences of a malware infection can include corruption of data or systems, ransom demands, or data exfiltration and data breaches. Advanced malware protection combines endpoint protection, centralized monitoring, rapid virus definition deployment, and access to incident response and malware sandboxing services to provide a powerful defense against an attack.

Key benefits:

  • Real time protection from advanced malware threats
  • Reduce overhead and free up IT resources
  • An experienced incident response team on call
  • Meet compliance requirements for endpoint protection
  • Improve overall security presence
Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology