If the product is (or will be) a core part of how you detect, investigate and resolve security incidents, chances are it’s already on our radar. It’s pretty straightforward for us to add mainstream SIEM, network detection or endpoint detection and response (EDR) products. If it’s something else, let us know and we’ll tell you how we’d approach it.
MSP1 has its own Managed SIEM powered by LTSsecure technology. We will deploy this monitoring technology to deliver SOC services.
If we are using your product and technology then chance are you have already integrated it into your ticketing system. If we are going to use our partner technology to provide you services, we can integrate this into your ticketing system.
Yes we can help you perform remediation action that is possibly remotely. We want to work closely with our customers to understand and clearly define what you’re comfortable with and under what circumstances.
Mobirise is perfect for non-techies who are not familiar with the intricacies of web development and for designers who prefer to work as visually as possible, without fighting with code. Also great for pro-coders for fast prototyping and small customers' projects.
Any intel you use in your security products to detect threats will create alerts that flow to MSP1. From there, our analysts will triage and investigate them.
We do. MSP1has analysts that are experts in each network, endpointand SIEM product that we support. When we onboard a new technology, we evaluate and test it with red teams and identify the alerts we’ll see under various attack scenarios. We use this experience to identify the types of alerts that are most meaningful and determine what level of severity we should attribute to each of them.
You’ve got three options. First, you can always call our security operations center (SOC) 24-hours a day, and an analyst will always answer. In addition, each customer has a dedicated engagement manager to assist you. You can also use chat/ email or ticketing system to communicate.
We do. When a potential incident arises we don’t want you to worry about how you’re going to respond. During the early stages of an investigation, it’s not always clear if you’re dealing with a relatively minor issue or a full-blown incident. As a thumb rule, if we identify 10 or more compromised machines during an investigation we consider it an incident.