Data Security

Data Security

Data Security describes how your business protects it’s Intellectual Property or “Crown Jewels”.

Cognosec Services

Cognosec Services

Features

The service would typically involve full or part-time management of some or all of the following technologies:

  • Antimalware
  • Browser Control
  • Endpoint Encryption
  • Host Based Intrusion Prevention
  • Database Security
  • Host-based Data Loss/Leakage Prevention (DLP)
  • Cloud Application Controls & BYOD

Description

Data Security describes how your business protects it’s Intellectual Property or “Crown Jewels”. Data Security is achieved by combining various technologies at specific points on a network and configuring these to work together according to security best practice. Every company’s network will differ slightly from others, so it is important to architect the solution before implementing it. We provide a full service from consulting, gap analysis, architecture & design, implementation and management.

Specification

Remote Managed Services imply the virtual presence of our people on your premises. Our staff work remotely either as technical consultants or subject matter experts, or may perform specific operational security tasks for your company, depending on your requirements and the type of service you require. Our Remote Managed Cyber Security Service options are:

  • Retainers, where a fixed amount of hours are purchased, bundled with an SLA for a guaranteed response.
  • Full Outsource Where you fully outsource one or more of your security functions to us. We take full responsibility for the function from end to end, (this can include design, implementation, which would take place on site. Once implementation has been completed, we will remotely perform the daily management of the platform and / or the chosen solutions. This would typically include reporting, escalation, troubleshooting and upgrading.
  • Partial Outsource Where you partially outsource one or more of your security functions to us. We take partial responsibility for the function, and this work takes place remotely. This can include aspects of design, implementation,  management of a platform or solution, reporting, escalation, troubleshooting and upgrading.

Our Managed Cyber Security Services can be tailored according to your exact needs and budget. We do not subscribe to a one size fits all approach. We have developed and refined an agile framework which focuses on the successful delivery and implementation of affordable security services to all sectors of the market. Customers who adopt our framework through our managed security services make noticeable progress towards a more mature security posture in very short timeframes. This is borne out in vastly improved coverage, policies, detection rates, correlation, deduplication, escalation processes, analysis, incident response and forensic capability, reporting and visibility.

Download as PDF