Protective services overview
Technology
With over 300 log events per second, LogSecure SIEM delivers a correlated view of security risks across everything running on your network and in the cloud. An extensive Global Threat Intelligence Network (GTIN) and I3 Security Incident Management Portal identify potential compromise and provide real-time security alerts to enhance detection capability and expedite root cause analysis.
People
An expert security team underpins our SIEM services with 24x7x365 threat monitoring, internet-based threat hunting and a customised log monitoring approach to support your systems and any bespoke applications. A Security Assurance Consultant ensures best practice is enforced at all times, with a dedicated Service Delivery Manager in place to ensure all commitments and expectations are met.
Process
24x7x365 monitoring from a UK-based Security Operations Centre ensures that your business is protected around the clock. Early warning threat intelligence updates provide guidance to reinforce protections ahead of an attack, while ongoing tuning of alert rules see that your service evolves in line with your business. We’ll also provide monthly Key Risk Indicator (KRI) reports and threat intelligence summaries. Should an incident arise, we’ll work with your internal team and relevant 3rd parties to action quick and effective resolutions.
Technology
On-site Qualys virtual scanner performs host discovery, vulnerability detection and compliance scanning to identify potential security risks. This includes Web Application Scanning, Real time Scanning Agents, PCI Compliance Scanning and live Threat Intelligence feed for newly disclosed vulnerabilities and emerging threats. Vulnerability insights are also used to inform tailored client reports.
People
A skilled security team supports every element of Vulnerability Management, providing regular vulnerability reports, configuring virtual scanner tools for ongoing optimised performance, with a Security Assurance Consultant on hand to ensure best practice is upheld. A dedicated Service Delivery Manager ensures all service expectations are met.
Process
Once deployed, your virtual scanner is continually optimised to ensure best performance. Tailored, ad-hoc scans can also be actioned on request by a client, or on notification of a zero-day vulnerability.
Key Benefits
Rapid remote deployment of monitoring and protection software through cloud management.
Protect key data, intellectual property and client data from theft and accidental leakage.
Detect targeted and sophisticated network attacks.
Reduce employee overhead and improve speed of response through automated defence and remediation.
Joined up overview of security incidents in the event of a breach – slashing the time it takes to respond.
Key Risk Indicator and security maturity improvements delivered within 4 weeks of SOC deployment.
Harden networks and systems to common network intrusion attacks and malware.
Help protect against zero day malware.
Faster root-cause analysis via multiple security logs including network, firewall, server, active directory, database and cloud systems.
Flexibility to evolve your service using our ‘Roll Out Roll In’ SOC protections.
Take the next step
Found the SOC for you? Take advantage of our 3-month free pilot and discover the Zepko difference risk-free. Or if you’d simply like to know more about our services, get in touch with our expert team.
Telecoms company's network perimeter evades attack
1 m
attacks against the Log4J vulnerability72 hrs
customer patched and protected0
data leakage or compromiseFollowing discovery of the Log4J vulnerability attackers attempt to discover vulnerabilities on perimeter facing systems with intention of installing Cobalt Strike to gain a foothold on these systems.
On identification of the Log4J vulnerability, the SOC initiated a critical threat advisory to the client and initiated perimeter and internal scans for this vulnerability.
The SOC team liaised with the client’s IT department and third parties to ensure that systems were appropriately patched in accordance with the vendor guidance for the software and systems operating on their networks.
The SIEM system was used to monitor for any indicators of compromise through correlation of the client’s security log feeds.
Patching and vulnerability management is basic security good practice and part of expected security due diligence.
1M+ attacks against the Log4J vulnerability
The average firm now devotes 21% of its IT budget to cyber security – a jump of 63%
Customer patched and protected in 72 hours
0 data leakage / compromise
One in six firms attacked in the past year said they almost went under. The threat is a complex one, But, like other business risks, it can be managed. The key is to build cyber resilience.
Our customer pledge
We’re confident in the services we provide, and we want you to be too. That’s why we offer the following pledge to every business considering onboarding us as their managed security service provider:
3-month pilot
free of charge
Put us to the test and let us run your 24×7 Security Operation Centre for free for the first 3 months. You can benchmark our performance against pre-agreed success criteria – and if you’re not convinced after the pilot, it won’t cost you a penny.
Lowest price
guarantee
Our mission is to make high-quality, tailored managed security services affordable to the mid-market – and we stand by our word. If you find another provider who can offer a like-for-like SOC service for a lower cost, we will refund the difference.
No half
measures
When you take part in our pilot you can expect the full Zepko service, not a trimmed down version. We’ll run a full 24×7 SOC operation, providing access to our specialist SOC team, process models and procedures, at the same level as our existing customers.
Deploy this SOC from £3,439 per month
The above cost has been calculated based on an organisation of 250 users. Larger organisation? As our services are scaled up, your SOC solution becomes more cost effective per user. Speak to us for an accurate quote for your business.