Managed Threat Intelligence

Advancing Your Cybersecurity Program & Posture

Many organizations are looking for solutions that are beyond basic security monitoring and alerting that is often found in Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) solutions. If this statement describes you, Vertek has you covered. We leveraging a robust, world-class SIEM (Security Information Event Management) platform, to ingest security related event data from across your enterprise. But we do more than leverage security technology to just monitor traffic, authenticate users, protect data, and prevent cyber-attacks. Vertek normalizes vulnerability and threat data into actionable intelligence and provides response services that eliminate threats to your business.

We generate advanced dashboards and security operations performance analytics that provide visibility into threats, detection, prevention, and response activities like no other provider has before. Vertek’s Managed Threat Intelligence service expands our core Managed Detection and Response service and provides:

SECURITY TECHNOLOGY
Vertek’s threat detection tools, proprietary process, analytics, and expertise can help identify malicious activity.

Using our SIEM/IDS/vulnerability tool analytics, we can provide alarm, asset, user activity, security events, policy violation reports, and more.

SECURITY OPERATIONS
Vertek’s security operation center (SOC) activities and reports are tracked, reviewed, and communicated monthly.

Tickets, alarms, maintenance, incident response, and monthly activities are all logged, tracked, and available on Vertek’s client portal.

COMPLIANCE
Vertek fulfills third-party assessment and 24/7 cyber monitoring – core elements of any compliance or regulatory initiative.

Evidence related to tools, monitoring, and assessment are delivered and tracked on our client portal. We’ll help you stay compliant with various regulations including FISMA, HIPAA, ISO 27001/2, and PCI.

INCIDENT REPORTING
Vertek’s incident report templates are used to document a perceived breach or significant security risk to our clients.

We provide a report including incident type, perceived risks and severity, and specific event details. We can also provide a technical analysis of the event given access to the information required to do so.

Top reasons why organizations leverage Vertek

  • I need dedicated security focus, visibility, and analytics

  • I need help managing the “flood” of security events

  • I need outside security expertise to augment existing staff

  • I need assistance meeting regulatory or compliance requirements

  • I need to detect non-compliance violations and system or service audit failures

  • I need to develop cyber incident and response (IR) capabilities in weeks – not months

What Our Clients and Partners Say About Our High Quality Service

  • The Vertek team is likeable, easy to engage, and responsive. Their ability to deliver a white-glove approach made it easy to give my customers what they need.


  • Vertek’s service is comprehensive. They offer price consistency and flexibility; and their price to value is solid.


  • There’s a huge economic advantage to outsourced SIEM/SOC services. Reduced costs and consistent pricing made Vertek a no-brainer for providing managed threat intelligence to my customers.


  • The detail within Vertek’s portal is unmatched. The information is both comprehensive and able to be distilled down to an actionable level.


Vertek Managed Detection & Response = all of the benefits from a world-class SIEM, plus enterprise-wide security coverage from a 24x7 Security Operations Center

Managed Security Solution Features MDR MDR+MTI
Baseline inventory scanning and asset registration Included Included
Baseline vulnerability environment scanning Included Included
Baseline event correlation, tuning and alarm trimming Included Included
Basic threat dashboard and report creation Advanced Advanced
SIEM tuning Continuously Continuously
Vulnerability Scanning Weekly Weekly
Network IDS and Endpoint Monitoring Included Included
Security Orchestration, Automation and Response (SOAR) Included Included
SIEM Alarm Monitoring and Analysis Included Included
Remediation Guidance Included Included
Quarterly Service/Relationship Review with TAM Included Included
Lifecycle and Compliance Report Management NA Included
Monthly Service/Technical Security Review with Analyst NA Monthly
Advanced Analytics & Dashboard Reviews NA Quarterly

Healthcare Cyber-Crime
Threat Indicators

Discover what you need to know about this unprecedented warning.

Zerologon -
CVE-2020-1472

Here’s what you need to know about this critical vulnerability.

Reasons to outsource vs. insource Cybersecurity Services

15 Reasons why outsourcing will save you time and money

Webinars

Resources