Vigilance™ Managed Security
Fully Outsourced Security Operations Center
Hardware as a Service
Monthly Managed Firewall Service
24x7x365 Log Management Service
Scanning & Identification of Risks
Incident Response & Forensics
Emergency Resolution Service
Security Education and Awareness Training
Monitoring for Compliance
Advanced Security Solution to Reduce Risk and Meet Compliance Requirements
Our Intrinium Vigilance Services (MSS), will monitor your devices in real time and provide 24x7x365 alerting and response of events critical to your business operations.
At Intrinium, we believe in proactively communicating to our clients in a way that is meaningful and intuitive to your organization. With our priority critical and high response time at 15 minutes, our team upholds our commitment to 24x7x365 Security Operations Center management and resolution.
Our team of Information Security Professionals has earned some of the most sought-after security and technology-related certifications in the field, including CISSP, CISA, C|EH, CRISC, and GSEC. Our team is also certified experts in critical security technologies such as Cisco, Fortinet, McAfee SIEM, Arbor, Tenable, and many others.
We are committed to best in class technology to ensure that we are fine-tuning our methodology to reduce false positives to ensure we are only reporting on the events that pose a threat to your network.
Unlike other organizations, we have an integrated approach to cybersecurity management; we collectively leverage our expertise and experience across all departments, which allows our team to continue to stay up to date on the latest threats and resolutions in real time. From firewalls to endpoints, we are committed to integrating our expertise into your environment to ensure your business is safe and secure.
If you are an organization looking to meet compliance requirements through monitoring, or if you are looking for a Managed Security Service Providers (MSSPs), Intrinium is your answer.
By Samantha Agather, Information Security Analyst– Intrinium Have an incident? We can help. When things go wrong regarding your company’s data, it can be terrifying. It will leave you wondering, what’s the full extent of the damage done, how did it happen and what’s...
External Network Vulnerability Scans vs. Internal Network Vulnerability Scans: Why Both are Important
By Johnathan Dunlap – Information Security Associate – Intrinium When it comes to security, threats can come from anywhere. That is why we recommend utilizing both external and internal vulnerability scans to understand the breadth of vulnerabilities within and...
By Stephen Heath - Partner and Advisory CISO - Intrinium This story is all too familiar. Accidents happen but, what if that mistake could cost you the security of your company? An employee left their laptop in their car and came back to a broken window and stolen...
By Samantha Agather, Information Security Analyst- Intrinium A Hitchhiker’s Guide to Firewall Management Services As a business owner, you want to keep your data safe. But what if your firewall fails and customer information is stolen, or you lose the person...
By Stephen Heath - Partner and Advisory CISO - Intrinium A relatively sophisticated spear phishing attack has been reported by InfoSec journalist Brian Krebs of Krebs on Security that appears to target many US financial institutions, including Banks and Credit...
The Health Information Technology for Economic and Clinical Health (HITECH) Act changed the HIPAA requirements for notifications after a breach.
Chiara Morrison - Manager, Marketing Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...
Chiara Morrison - Manager, Marketing What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...
Chiara Morrison - Manager, Marketing What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1. Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...
Chiara Morrison - Manager, Marketing All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...