Vertek’s threat detection tools, proprietary process, analytics and expertise can help identify malicious activity
Leveraging our SIEM/IDS/Vulnerability tool analytics, we can provide alarm, asset, user activity, security events, policy violation reports and more.
Vertek’s Security operation center (SOC) activities and reports are tracked, reviewed and communicated monthly
Records and accountability of tickets, alarms, maintenance, incident response, and monthly action items activities are all logged, tracked and available on Vertek’s client portal.
Vertek fulfills third-party assessment and 24/7 cyber monitoring which are core elements of any compliance or regulatory initiative
Our people, process and technology enable Clients to achieve desired levels of compliance. Evidence related to the tools, monitoring and assessment are delivered and tracked on our client portal. Our service and reporting help our clients achieve various types compliance initiatives and or regulations, including FISMA, HIPAA, ISO27001/2 and PCI.
Vertek’s incident report templates are used to document a perceived breach or significant security risk to our Clients
Client identifier, incident type, dates and timeline associated, perceived risks, perceived severity, actions and communications are all part of the executive summary. We also capture event details specifics, such as system owner, system ID, alarm type, alarm category, detection method and timeline. Lastly, we can provide a technical analysis of the event (to the extent we have access to the information required).