Vigilance™ Security Operations Center (SOC)

An organization’s information assets are in constant danger of compromise by unauthorized individuals both from the outside as well as from the inside. To protect the security of these systems and the information contained therein, Intrinium has developed Vigilance, a network security platform and service monitored by a team of CompTIA Security+ and NSE4 certified professionals.

The Intrinium Vigilance™ Security Operations Center (SOC) will monitor your devices in real time and provide 24x7x365 alerting of events critical to the operations your business. Using our tuning methodology, we strive to reduce false positives and cut through the noise to identify only the events that threaten your network.

Every minute, of every hour, of everyday, we are here to provide:

 

Monitoring for Compliance
Proactive Threat Monitoring, Detection and Response
Management of Logs and Responses
*Extent of remediation varies depending on select package
Security Intelligence
On-Going Reporting
Remediation*

Phishing and The Seasons

By Sahan Fernando - Director, Managed Security - Intrinium  Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...

Financial Planning for Security

By Sahan Fernando - Director, Managed Security - Intrinium  Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...

Celebrating Cybersecurity Month!

By Chiara Morrison - Manager, Marketing - Intrinium  October 2018 marks the 15th annual National Cybersecurity Awareness Month (NCSAM), which is an annual initiative to raise awareness about the importance of cybersecurity. NCSAM 2018 is a collaborative effort between...

SMB Relay Attack Tutorial

Don’t even bother cracking NTLMv2 hashes gathered with Responder! Instead, just relay them to a target machine on the network and pop yourself into a LocalSystem shell. This attack uses the Responder toolkit to capture SMB authentication sessions on an internal network, and relays them to a target machine.

Pin It on Pinterest