section-icons-white2a

ITC MANAGED SECURITY SERVICES

We offer cyber security as a service to large and mid-market clients, enabling them to protect their critical data assets across on-premise and cloud-based infrastructures. Supported by expert analysts and national security-level advisors, and managed through our UK-based Security Operations Centre, we provide scalable and cost-effective solutions that deliver comprehensive threat intelligence, detection, management and response.

X

FIREWALL AND INTRUSION PREVENTION

Network intruders, who could come from inside as well as outside the network, will look to exploit your vulnerabilities. They’ll launch distributed denial-of-service attacks, or attack Internet connections. This has the potential to release worms and viruses that can spread across worldwide networks in a matter of moments. There is often no time for human intervention – the network itself must possess the intelligence to recognise and mitigate these dangers.

Why you might need this service

This is a cost effective, entry-level cyber protection service that guards against network intruders and attackers. Allowing you to be sure your network perimeter is secure, and to know that anyone accessing it, from outside or inside, will not pose a risk to your cyber security. It’s an essential part of the cyber security basic hygiene that all businesses should adopt, and it ensures compliance with the growing demands from tighter regulation.

Key benefits

The service ensures that, in spite of an ever-evolving threat landscape, your critical infrastructure is protected and you have control and visibility of all applications.

ITC delivers:

  • 24/7/365 proactive monitoring and management
  • Rapid deployment of preventative measures
  • Protection against advanced persistent threats
  • Actions to stop malware entering your network
  • ISO 20000:1 change control processes
  • Easy integration with other ITC services

Why ITC

We have more than two decades’ experience of delivering firewall and intrusion protection for some of the UK’s best-known organisations and a number of major global brands. The service is managed by expert analysts from our state of-the-art secure operations centre in London.

X

LOG MANAGEMENT

This service logs the activity on your network and uses the data to identify cyber threats – actual and potential. It also supports the regulatory requirement for businesses to retain user logs which can be forensically analysed.

Why you might need this service

How do you know who’s using your network, when and for how long? Can you compare usage to identify suspicious behaviour? And do you have records that confirm your regulatory compliance?

Key benefits

This service simplifies your security arrangements by providing:

  • 24x7x365 monitoring (via our secure operations centre in London)
  • Time-synchronised logs across your multiple platforms (infrastructure, servers, endpoints and applications)
  • Scalable secure storage for the multiple terabytes of data logged each day
  • A centralised repository which ensures regulatory compliance

The service also enables better risk management and decision-making, as logged data can be used in sophisticated ‘what ifs?’ to evaluate, and plan for, possible future intrusions. This means appropriate recovery plans can be designed around likely scenarios.

Why ITC

We provide automated/scheduled reporting, access to security experts, and the cost certainty associated with continual, resilient management and platform support. Our managed security services have been providing visibility, control and assurance to major global brands for more than two decades.

X

SECURITY INCIDENT EVENT MANAGEMENT (SIEM)

Our SIEM service provides 24x7x365 proactive security to protect an organisation’s most precious data assets. It incorporates centralised logging, threat monitoring and vulnerability management. Our UK-based team of security analysts supports the service.

Why you might need this service

In an ever-evolving threat landscape, with increasing corporate risk responsibilities, more regulated compliance rules and hefty breach fines, how do you manage your cyber risk, your critical data and protect your brand reputation?

Key benefits

The main benefit associated with ITC’s SIEM service is peace of mind. We deliver this through a constant process of monitoring known areas of risk and analysing dynamic threat feeds, which we review against your logging data, asset model and vulnerability management rules.

The service provides:

  • 24x7x365 monitoring (via our secure operations centre in London)
  • Time-synchronised logs across your multiple platforms (infrastructure, servers, endpoints and applications)
  • Scalable secure storage for the multiple terabytes of data logged each day
  • A centralised repository which ensures regulatory compliance

In a world where cyber resource is scarce and most businesses require around ten full-time staff to provide 24-hour network monitoring, our experts take the pressure off your security team and help you make the most of your IT budget.

Why ITC

We have more than two decades’ experience of delivering SIEM for some of the UK’s best-known organisations and a number of major global brands. The service is managed from our state-of-the-art secure operations centre in London.

X

NETWORK ACCESS CONTROL (NAC)

NAC reduces cyber risk by establishing and enforcing security policies that control/restrict the users and devices that can access your network.

Why you might need this service

How can you provide a mobile workforce or a diverse customer base with access to your network while ensuring security and complying with data regulations?

And with BYOD and the IoT can you really police who, and what, uses your network without limiting creativity, reducing productivity and potentially excluding new business?

Key benefits

Through a process of simplifying, identifying, controlling and remediating, our NAC service enables seamless interaction, while ensuring compliance.

It provides:

  • 24x7x365 proactive monitoring and management across your entire network (wired and wireless)
  • Visibility from any device, anywhere at any time
  • Processes for guest access and onboarding
  • Assurances to keep pace with ever-evolving cyber threats (patch management policies)
  • Automated containment of rogue or compromised devices

Why ITC

We partner with technology specialists to provide continuously managed NAC services that protect corporate networks. We incorporate centralised access control, user and device visibility, enforced endpoint compliance and holistic network protection, all of which helps alleviate the pressure on your already-stretched internal resources.

X

VULNERABILITY INTELLIGENCE

Businesses face hundreds of malicious attempts to break their cyber defences every day, and nearly half of all UK firms have suffered breaches or attacks in the last 12 months. Our Vulnerability Intelligence service helps you cope with this threat. It identifies your overall exposure to cyber attacks, ascertains the dangers inherent in your network, and enables you to prioritise your security spend.

Why you might need this service

It will help you to understand the threat to your business, and enable you to take control of, and manage your level of risk. It does this by establishing where you are most vulnerable to cyber attacks, identifying precisely what’s on your network, where your key data is housed, what should be patched and how effective your patching process is.

It also considers the cyber threats to your business – what they are, which are a priority and where you are most vulnerable to the attacks that will inevitably occur.

Key benefits

You will obtain visibility of all your assets (known and unknown), and gain an understanding of those that are critical to your business.

To make this possible we:

  • Provide visibility of disparate systems and applications
  • Identify your critical data
  • Show you where you are most vulnerable
  • Review the effectiveness of your current patching process.

Why ITC

We are proven vulnerability experts, delivering global visibility, control and assurance, supported by 24x7x365 monitoring and management from our London-based security operations centre.

X

BEHAVIOURAL ANALYTICS

Insider threats to your cyber security are potentially the most devastating. They are founded on familiarity with your organisation and privileged access to your data. If Edward Snowden can undermine the NSA, what are the chances an individual could wreak havoc with your business?

Why you might need this service

Based on machine learning and artificial intelligence, it observes and monitors user devices and network activity to learn your organisation’s way of life. It can then detect threats and anomalies in real time – and act on them.

This will help you manage the evolving risk of cyber attacks and ever-present insider threats, meet increasing regulatory expectations, and make best use of finite resources.

Key benefits

It is an automated process that provides 24x7x365 security risk reduction and real time remediation of incidents that may have gone undetected in traditional event-driven alerting platforms.

In addition it:

  • Frees-up existing staff (entire network monitoring reduces reliance on security maintenance)
  • Brings greater visibility of network traffic (maintains regulatory compliance)
  • Increases flexibility and cost-effectiveness (additional benefits through integration with existing services)

Why ITC

From our security operations centre we monitor logs, incident reports, anomaly threats and insider risks, alerting you through prioritised, consumable reports for both technical and executive audiences.

Tel:
+1 202-452-9133