MANAGED ATTACK MITIGATION SERVICE (MSS-AMS)
The Managed Attack Mitigation Service (MSS-AMS) is a “Security as a Service” (SaaS) offering to monitor and mitigate known and unknown threats from Intruders, Denial of Service and Behavioral attacks to the perimeter of the organization. Together with GLESEC’s Orchestration’s platform, this service integrates security information from threats with other sources to increase confidence, reduce time to mitigate and eliminate blind spots.
How does it work?
Turnkey, Security as a Service. The delivery is done by deploying a GLESEC appliance (GMSA) on-prem between the border router and the firewalls of the organization. Once the Professional Services team has completed the deployment and configuration the system goes into operations. GLESEC Operation Centers monitor the health of the systems and the security information. GLESEC Operations analyses attacks, targets, methodologies and persistency and reports accordingly. Threat mitigation is automatic for the greatest extent. The information is provided in a number of dashboards on the Orchestration platform for the client to visualize the activity, including MAP, RADAR and Threat Analytics as well as statistical information. Cases are opened as applicable for incident handling.
- GLESEC delivers this services on-prem, using GLESEC GMSA Appliance.
- GLESEC Professional Services deploys and configures the service.
- Attacks are stopped mostly automatically unless it requires GLESEC’s operations custom involvement.
- GLESEC’s Secured Operation Centers monitor, hunt and respond based on established playbooks 7x24x365 to contain, mitigate, alert and report
- Client’s access to the GLESEC’s Orchestration platform (based on contract of Orchestration service) providing visibility of the various elements of the GLESEC 7eCSMTM framework. This allows access to detailed dashboards and reporting as well as the Case & Resource Utilization application, News service and other tools. The Case & Resource Utilization application is used to manage the full lifecycle process for threat identification and mitigation that takes into consideration all the communication interaction with various levels of the client’s organization.

GLESEC’s approach to threats starts with RISK of Critical Assets to identified vulnerabilities and threats and then drill-down to each for remediation and investigation is both integral and unique.
Sergio Heker, CEO
Provides peace of mind in the detection, identification and protection of DDOS and intruder attacks to the perimeter of the enterprise. Reduces time to mitigate.
Promotes a continues risk-reduction and on-going cyber-security improvement and mitigation process.
Helps eliminate cyber-security risk factors that can impact business operations.
BENEFITS
The benefits of this service are:

Augments the internal staff by partnering with an organization with core competency in cyber-security operations.
Meets compliance in regulatory requirements.
Most cost-effective solution based on the benefits of outsourcing.
This service can be classified according to the following table:
Monitoring
Yes
Testing
Protection
Yes
Compliance
Forensic
Remediation
Mitigation
Yes
Each of the MSS services can be mapped to one of the seven elements of the 7eCSM.
In this case the mapping is:

Take control of your cyber-security now!
Comments are closed.