infotex staffs a Network Operations Center 24x7x365, where our Security Analysts do nothing but watch networks, investigating and responding to threats and anything out of the ordinary in real time. For detection, we use thousands of signatures maintained by Emerging Threats Pro, as well as protocol and anomaly analysis.
infotex also adds customized signatures to detect the issues and activities that you are most concerned about.
Our Intrusion Prevention System responds to predictable attacks within seconds. For those threats and events that require investigation, we average about 15 minutes in response time.
Our Event Log Management System as well as our Change Detection Service correlate with our Intrusion Detection to provide a stable, forensics-proof Security Monitoring Architecture that your examiners and auditors will love! The fact that we help our Clients develop the entire Incident Response Process, from the development of policies and procedures to the execution of Incident Response Testing, sets us apart from the cookie-cutter MSSP’s.
Our clients love that we push reports that have been reviewed by infotex Security Analysts on a daily basis (as well as monthly and quarterly trend reports). You can still log into the portal to see the information yourself, but imagine employing professionals to review the data collected in your database, decipher the graphs and charts, create the reports, and then send the reports to you.
Our greatest strength is our size. We customize our approach to your unique needs, not only in our reporting and response “decision tree,” but even in how we connect to your network and push reports to your team. When you investigate infotex as an MSSP, ask our clients how focused we are on their unique needs, and how we customize our approach.
As an example of customization, ask our clients how we will help you re-write your overall Incident Response Program. We will be an extension of your IT security team, and since our management also audits banks, we understand what must happen to ensure compliance! The added value that we bring to the table with our IT Resource Library is one reason our Clients love us!
Contact us for assistance with your information security and information technology risk management needs!
Many organizations spend time and money deploying endpoint protection, then think the Read more
Some small organizations continue to use customer data to generate initial passwords, Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Risk isn’t the only thing to consider when planning a decision tree. Another one of t Read more