Cookie-cutter approaches do not work in Information Security. The economy of scale yields a lack of security, in our opinion. Though we do bring extensive templates, lexicons, and tuning processes to a managed services engagement, we take great pride in our ability to customize our detection and response methods to your unique needs. Our decision trees, calling trees, and response methodologies will be customized to your unique situation. Meanwhile, we can write signatures for any situation you can imagine. As founders of bleedingsnort.com, we have been writing signatures since 2003. Ask our existing Clients if they think we take a “generic” approach to security!