Sie sind auf Seite 1von 16

Stealth-ISS Group Inc.

SIEM-AS-A-SERVICE
FULLY MANAGED SIEM-AS-A-SERVICE
While you and your IT staff focus on more pressing company projects, Stealth Group’s security experts monitor,
analyze, manage, and protect your network from threats–24/7/365. Stealth Group’s Managed SIEM adds a full
management layer on top of our powerful SIEM (security information & event management) service to ensure
your network is always as secure as possible.
www.stealth-iss.com

Free up internal IT Reduce security Avoid upfront investments


resources and projects costs by up to 97% or costly overhead
STREAMLINE YOUR IT SECURITY
Our Managed SIEM gives your business the opportunity to toss out their patchwork security solutions and
implement a highly effective, future-proof security plan instead.

Network Operations Center Management Security Operations Center Management


www.stealth-iss.com

• Automated Asset Discovery • Intrusion Detection


• System Performance Monitoring • Threat Detection & Response
• Real-time Configuration Change Monitoring • Incident Management
• Real-time Event Correlation • Vulnerability Management
• Log Management • Threat Intelligence
• User & Entity Behavioral Analysis • Anti-virus Device Protection
• File Integrity Monitoring • Security Orchestration & Automation
• Compliance Reporting
ADDITIONAL BENEFITS

Threat Detection and Response IT Incident Management Automated Asset Discovery


Quickly identify and mitigate Ensure the network is secure Automatically detect and monitor
network threats as they happen in and at safe operating levels new endpoints that connect to the
real time after any setback network
www.stealth-iss.com

System Performance Monitoring Event Log Management Security Automation and


Orchestration
Monitor IT performances of the Record, store, and organize
Adjust and control every facet of your
entire network stack right down to event logs and usage data for
overall security efforts through a single
the endpoint any network component. pane of glass

Real-time Event Correlation User & Entity Behavioral Analysis Compliance Reporting and
Management
Immediately catch and isolate Detect anomalous user behavior to
stop malicious acts before they Easily pull reports and other essential
events that could pose a serious
even start data to display compliance at a
threat to the business moment’s notice
LOG MANAGEMENT
Make Storing and Organizing Event Logs Simple
We give you the ability to monitor and manage event logs and endpoint device usage across the entirety of your network –
helping keep critical assets secure and satisfy regulatory compliance requirements at the same time.
www.stealth-iss.com

Audit Ready | High-Speed Collection | Centralized


Management Database (CMDB)
• High-speed event log collection at over 10,000 events per second
per node
• Accurately collect, parse, index, and store event logs at scale
• Track breaks or deviations from normalized event patterns
• Collect event data for users and network devices located anywhere
• Collect rich event data on file changes, software changes, registry
changes, syslog changes, or other custom areas
• Advanced event logging for Windows and Linux agents
SECURITY AUTOMATION & ORCHESTRATION

Complete Security Management In One Place


Rather than rely on manual checks and processes to support their overall security efforts, we give you the ability to automate and
control virtually 100% of their security operations from a single, centralized user dashboard. Tasks that used to take time and
human intervention to address can now be intelligently automated and executed to maximize the efficiency of your internal
www.stealth-iss.com

security teams.

Deeper Automation | Unified Operations | Intelligent Insight


• Automate remediation scripts for faster problem resolution
• Unified security fabric to automatically detect threats across, devices, platforms,
applications, and locations
• Detect changes to files, software, or registry information
• Automatically discover and monitor physical and virtual network infrastructure
• Automate event alerts, performance reports, compliance reports, and more
• Rich dashboards for real-time and historical insight into all network activity
REAL-TIME EVENT CORRELATION
Catch and Isolate Threats Before They Start
We provides event correlation capabilities that allow you to automatically sift through hundreds of thousands of network events,
quickly isolate the ones that may pose a risk your business, and respond accordingly – all in real time.
www.stealth-iss.com

Deeper Detection | NOC + SOC | Rich Context


• Detect complex event patterns and isolate threats across multiple
nodes in real time
• Distributed data collection and search capabilities
• Handles high event rates for faster detection and response
timeframes
• Automatically prioritize which event patterns or threats need
immediate attention
• Cross-correlate NOC and SOC analytics to get a more holistic,
unified view into the health of your network
• Edit existing rules or create your own to fine-tune event alerts
USER & ENTITY BEHAVIORAL ANALYSIS

Detect Abnormal User Behavior In Real Time


Our user and entity behavior analysis abilities allow you to immediately detect any unauthorized network use, inappropriate
employee behavior, or any other malicious interactions or anomalies found on your network. Depending on the severity of the
event, we can automatically freeze the activity and notify your security team so they can respond quickly and accordingly.
www.stealth-iss.com

Minimize Error | Historical Forensics


• Catch unauthorized network devices, applications,
and configuration changes in real time
• Dynamic user identity mapping to accurately pinpoint
internal or external threats
• Customizable dashboards to visually inspect user
locations, devices, and behavior
• Keep an audit trail of IP addresses, user identity
changes, and geo-mapped user locations
• Leverage machine learning to detect suspicious
behavior without needing to write complex rules
• Compare DHCP, VPN, WLAN, and Domain Controller
login data to easily detect stolen user credentials
OUT OF BOX COMPLIANCE & REPORTING

Quickly and Easily Prove Company Compliance


Maintaining compliance is a critical part of running a business, but managing controls and generating reports can be a huge pain.
To simplify those efforts, our compliance management capabilities allow businesses to store, organize, and quickly extract the
exact data needed to demonstrate their company’s compliance at a moment’s notice.
www.stealth-iss.com

Out-of-the-Box Reports | Automated Management | Audit Ready


• Prebuilt reports for: PCI, COBIT, ISO, ISO 27001, HIPAA, GLBA, FISMA, SOX, ITIL,
NERC, GPG13, SANS Critical Control, NIST800-53, NIST800-171, and more.
• Audit trail of internal and external network activity
• Collect rich event log data for users and devices across platforms and geographic
locations
• Schedule and automate compliance reports and other essential data to key stakeholders
• The compliance report library and unified search capabilities enable quick access to
essential reports
• Personally identifiable user information can be hidden to meet GDPR compliance
standards
VULNERABILITY MANAGEMENT
Monitor and Hunt Your Network for Malicious Activity
Our vulnerability management capabilities allow you to continuously hunt your network for malicious activity, securely mitigate
threats, and use the knowledge gained to optimize response methods and processes in the future to completely minimize
network vulnerabilities.
www.stealth-iss.com

Vulnerability Scanning | Remediation Strategy


Planning | Risk Scoring
• Rapid threat feed monitoring at scale, capable of handling over 10k
events per second per node
• Create watch lists to isolate and monitor suspicious entities
• 24/7 network monitoring by Stealth Group security professionals
available
• Execute pre-built remediation scripts or customize your own quickly
thwart threats
• Automatic asset discovery engine to detect and monitor network
devices
• Unified security fabric to minimize security gaps
SERVICE DELIVERY

• Managed Service
• Initial Install and configuration
• IR Management
• Maintenance/Troubleshooting/live feeds and
www.stealth-iss.com

signatures updates
• Fine Tuning and full management throughout
contract
• Annual contract – discounts for 2-3 year
contracts
• US Based SOC

• Includes all licenses and services


Stealth-ISS Group Inc.
®

ABOUT US
ABOUT US

Stealth – ISS Group® Inc. (est. 2002) act as your extended IT, cyber security, risk and compliance
team and provide strategic guidance, engineering and audit services, along with technical remediation
and security operations. We pride ourselves on the quality and professionalism of our workforce,
collaborative relationships with our clients, and our ability to bring you innovative, customized but
www.stealth-iss.com

affordable vendor agnostic solutions based on your immediate needs while aligning with your
business strategy and operations. We add massive value and save you money on staffing a
permanent security organization.

We are a passionate about protecting companies and agencies from all facets of cyber-crime,
protecting your people and company data, reducing your information and financial losses, and
protecting your reputation.

Stealth Group consistently delivers trusted, world-class cyber security and IT solutions. By delivering
tailored solutions, and highly qualified cyber experts, Stealth Group has earned its spot on the Inc.
500 list, a list of America’s top entrepreneurs. We speak the truth in security and go great lengths to
build trust with our customers by professional and high-quality service delivery, and by offering
effective, uncomplicated, and economical solutions.
STEALTH GROUP CAPABILITIES
www.stealth-iss.com
STEALTH GROUP DIMENSIONS OF CYBER
www.stealth-iss.com
THANK YOU

HQ – ARLINGTON, VIRGINIA OFFICE LOCATIONS


4601 North Fairfax Drive, Suite 1200 Huntsville, Alabama
Arlington, VA 22203
Las Vegas, Nevada
London, England
Dubai, United Arab Emirates
Bratislava, Slovakia

Stealth-ISS Group® Inc. | www.stealth-iss.com | bizdev@stealth-iss.com

Das könnte Ihnen auch gefallen