MANAGED ATTACK MITIGATION SERVICE
(MSS-AMS)

The Managed Attack Mitigation Service (MSS-AMS) is a Adaptive Security as a Service”  aSaaSTM  offering to monitor and mitigate known and unknown threats from Intruders, Denial of Service and Behavioral attacks to the perimeter of the organization.  Together with GLESEC’s Orchestration’s platform, this service integrates security information from threats with other sources to increase confidence, reduce time to mitigate and eliminate blind spots.

 

How does it work?​

Turnkey, Security as a Service. The delivery is done by deploying a GLESEC appliance (GMSA) on-prem between the border router and the firewalls of the organization.  Once the Professional Services team has completed the deployment and configuration the system goes into operations.  GLESEC Operation Centers monitor the health of the systems and the security information.  GLESEC Operations analyses attacks, targets, methodologies and persistency and reports accordingly.  Threat mitigation is automatic for the greatest extent.  The information is provided in a number of dashboards on the Orchestration platform for the client to visualize the activity, including MAP, RADAR and Threat Analytics as well as statistical information. Cases are opened as applicable for incident handling.

MANAGED ATTACK MITIGATION SERVICE (MSS-AMS)

GLESEC’s approach to threats starts with RISK of Critical Assets to identified vulnerabilities and threats and then drill-down to each for remediation and investigation is both integral and unique.

Sergio Heker, CEO

Provides peace of mind in the detection, identification and protection of DDOS and intruder attacks to the perimeter of the enterprise. Reduces time to mitigate.

Promotes a continues risk-reduction and on-going cyber-security improvement and mitigation process.

Helps eliminate cyber-security risk factors that can impact business operations.

BENEFITS

The benefits of this service are:

Augments the internal staff by partnering with an organization with core competency in cyber-security operations.

Meets compliance in regulatory requirements.

Most cost-effective solution based on the benefits of outsourcing.

This service can be classified according to the following table:

Monitoring

Yes

Testing

Protection

Yes

Compliance

Forensic

Remediation

Mitigation

Yes

Each of the MSS services can be mapped to one of the seven elements of the 7eCSM. 
In this case the mapping is:

Take control of your cyber-security now!

Comments are closed.