Managed Detection and Response for Cloud
24/7 Threat Monitoring for Cloud Environments
Our Managed Detection and Response (MDR) Solution will monitor, detect and respond to cyber threats that have evaded existing security controls. Manned by a team of highly skilled cyber analysts based in Telesoft’s UK based Security Operations Centre (SOC) - this invaluable service continuously monitors your organisation’s network - 24/7/365 days a year.
How Telesoft Help...
Our Managed Detection and Response service can monitor the following:
24/7 Human-Led Threat Hunting mapped to Mitre Att&ck and PCI-DSS
Rapid Alerting and Active Response
Suspicious User & Account Activity
Government Telco Grade Technology bought to the Enterprise market
Unauthorised Infrastructure Changes
Access to a 24/7 UK based Security Operations Centre
Key Service Features
24/7 Threat Monitoring
Telesofts Security Operations Centre (SOC) is manned by experienced cyber analysts. We carry out active threat hunting and monitoring within your cloud environment 24/7
Alerting & Active Response
If your Cyber Analysts detect anomalous or malicious activity we will take action.
Our service natively supports Microsoft Azure, Microsoft 365, Amazon AWS and Google Compute. Connectors for other cloud service and applications are available.
Flexible Deployment Options
Based on our TDAC enterprise toolset, we can deploy on-prem, in the cloud or host on your behalf in our secure data centre.
Minimum 90 day retention
Cloud providers generally provide access to 30 days worth of log data for analysis which is inadequate in most cases. We provide a minimum of 90 days of log data.
Continuous Vulnerability Assessments
Telesoft can identify, advise and assist with remediation of vulnerabilities across your cloud-hosted server estate.
We Can Monitor....
Amazon AWS Monitoring
We can threat hunt across Amazon AWS services including: - Amazon Elastic Compute (EC2) & Lightsail Virtual Machines - Amazon Virtual Private Cloud (VPC) - Amazon CloudTrail - Amazon GuardDuty Note: This is not an exhaustive list, other monitoring features are available
We can threat hunt across a variety of Microsoft Cloud services including: - Azure Active Directory - Azure Virtual Machines - Microsoft 365 - Microsoft Sentinel - Microsoft Defender 365 Note: This is not an exhaustive list, other monitoring features are available
We can threat hunt across a variety of Google Cloud services including: - Google Cloud DNS - Google Virtual Private Cloud (VPC) - Google VM Firewall Rules - Google HTTP(s) Load Balancers - Google Cloud Storage Note: This is not an exhaustive list, other monitoring features are available