fbpx

Vigilance™ Managed SIEM

Home » Services » Managed Security Services » Vigilance™ Managed SIEM

The Intrinium Security Information and Event Management (SIEM) solution utilizes state of the art hardware to collect, analyze and store logs from your digital environment. In conjunction with our digital tools, we are committed to real-time analysis, monitoring, detecting and responding to security alerts 24x7x365 to allow your business optimal productivity.

 

The Managed SIEM Solution will assist in correlating data between the following sources:

Business Critical Applications, such as email

Firewalls

Web Services

Email Servers

Network Hardware

Switches

Web Servers

File Servers

Connections

End Points

Other Network Devices

Other Supported Devices

This comprehensive solution thoroughly covers your network to identify threats, leveraging access to our threat intelligence feed to aid in meeting compliance and regulatory standards:

PCI-DSS

HIPPA

SOX

ISO

NCUA

FISM

FERPA

GLBA

NERC

CIP

GPG13

DISA STIG

and More

This solution will provide: 

Protection of Business Critical Assets within Your Organization

Risk Reduction

Comprehensive Reporting

Ongoing Operational Security Support

State of the Art Solutions

Evolution of Security Posture

Access to Proactive Intelligence Threat Feed

New Threat Detection

On an agreed upon basis, we will provide a comprehensive report that will communicate the operational metrics and key performance indicators, which can be used and summarized appropriately for either technical resources or Executive leadership dependent upon client needs.

We are here to help, contact us today.

Gap Analysis 101

f you have spent any time around information technology or people who work in information security, you have probably heard terms like “risk assessment”, “audit”, and “gap analysis”. Sometimes they are used almost interchangeably. However, each has a specific objective to help stakeholders understand their data environment.

While an audit is used to identify control effectiveness and a risk assessment can identify what controls can be implemented to reduce risk, the gap analysis is designed to do exactly what it states – to identify gaps between the current environment and the organization’s required or desired state. This may be a specific regulatory compliance objective, such as how the organization meets the requirements of the HIPAA Security and Privacy Rules or PCI-DSS. In many cases, an organization may want to be able to claim that they are compliant with an information security standard, such as ISO27001. In other instances, the organization may have developed a roadmap for where they plan to be in the future, and want to identify the current progress and next steps. A gap analysis can provide essential feedback for all three examples.

BSides Portland 2019 Recap

At Intrinium, we strive to offer as many opportunities as possible to further education, encourage team collaboration, and networking across our industry. Last weekend, our Managed Security Services team headed to the Portland Convention Center for BSides Portland...

BSides Sacramento: The Recap

  This past weekend, Partner and Advisory CISO, Stephen Heath attended the inaugural BSides event in Sacramento, California. BSides is a national Information Security conference that takes place throughout the nation, it is 100% volunteer organized to continue to...

Cryptocurrency Security 101

By Turner Lehmbecker – Information Security Researcher – Intrinium Introduction With the increasing popularity and value in Bitcoin and other cryptocurrencies like it, many people have become interested in exploring the use of cryptocurrency as potential investments...

Pin It on Pinterest