Cybersecurity: a vast perimeter to defend while playing on multiple chessboards.
Latest generation EDR antivirus, a proven and acclaimed solution to protect your business
Protect your business with the next-generation EDR (Endpoint Detection and Response) antivirus. Traditional antiviruses that work by signature detection are no longer able to effectively counter the most recent attacks. In addition to traditional antiviral signatures, EDRs analyze behavior using artificial intelligence (AI) algorithms. A “zero day” attack (still unknown to date) will therefore be detected by the EDR software which, being very reactive, will react to the unusual behavior of this new virus.
To validate your web applications, we perform a variety of tests based on the Open Web Application Security Project (OWASP) which will clearly identify risks and vulnerabilities.
Assessing your cybersecurity posture helps identify weaknesses and vulnerabilities to fully understand the risks associated with your current situation. Our recommendation report will help you make the right decisions and invest in the right places in order of priority.
Dark Web monitoring
A dark web monitoring service in order to let you know when your passwords are on sale or publicly available. Contrary to popular belief, it is often in simplicity that hackers find their access.
SIEM Managed Security Service
Comparison of managed SOC / SIEM services
|Security event management||Management and monitoring of security events|
|Monthly report||Monthly report and dashboard that summarizes events by category|
|Incident management||Setting up the right playbooks for your business to handle incidents|
|8/5 Alerts||8/5 communication of High Category Alerts|
|24/7 Alerts||24/7 communication of High Category Alerts|
|Multi-Manufacturers Collector||Our solution connects to the majority of technologies on the market|
|Event archiving||Archive of medium- and long-term events|
|Multi-level alerts||Multi-level alerts on data movements, atypical behaviors, deviations, and geolocation|
|AI analysis||Use of machine learning to continuously improve responsiveness to the different identified behaviours|
|Integration API||SIEM has a REST API that allows any external system to integrate into the CMDB, make event queries and send alerts|
|Automation of actions||The majority of actions can be automated through use cases and scripts|
|Monthly Vulnerability Report and Meeting||A report and a meeting with a cybersecurity expert to discuss identified events and recommendations|
|Quarterly Report and Vulnerability Meeting||A report and a meeting with a cybersecurity expert to discuss identified events and recommendations|
|Recognition of abnormal human activity (UEBA)||After learning about a person’s normal behaviour, the system will be able to identify and react to any out-of-the-ordinary behaviour according to the pre-established parameters|
|Dark Web monitoring||Continuous monitoring of your credentials (passwords) on the Dark Web|