CYBER THREAT WATCH SERVICE PACKAGE


24×7 CYBER THREAT MONITORING SERVICE

Our security operation's centre gives 24-hour monitoring and provides Low, Medium and High Response based on the level of Cyber Threats detected by Thoughthive's Threatsentinel.

 

 

THREAT ANALYSIS, INCIDENT RESPONSE AND REPORTING SERVICE

Support during the process of incident identification, investigation, response and containment, rectification and monitoring

 

SECURITY AND COMPLIANCE REPORTS

 

Thoughthive's Cyber Threat Watch Centre’s reports via Threatsentinel aids in incident investigation and documentation, and includes reporting packs for PCI, SOX, HIPAA, GLBA, FISMA and ISO

ACTIONABLE ALERTS SERVICE

Attack alerts provided by Thoughthive's Cyber Threat Watch Centre incorporate a clear, plain-language description of the underlying attack and the risk it poses, pinpointing the exact resources that may have been affected, and recommending what immediate actions should be taken to mitigate it.

 

ZERO-DAY ATTACK IDENTIFICATION

Thoughthive's Cyber Threat Watch Centre uses powerful behaviour-based analysis via Threatsentinel to identify new attacks that can bypass signature-based countermeasures

 

CENTRALIZED EVENT LOGGING MANAGEMENT AND STORAGE (THREATSENTINEL @CUSTOMER PREMISE)

Thoughthive's Cyber Threat Watch Centre rapidly investigates incidents and provides easy access to all incident data, raw logs and correlated records via Threatsentinel system


HOW CYBER THREAT WATCH SERVICE WORKS?

CTWS.png

MANAGED WEB DEFENCE SERVICE PACKAGE


VIRTUAL WEBSITE PATCHING

Our service will virtual patch your site on our cloud infrastructure making sure that those vulnerabilities can't be used against you.

MALICIOUS TRAFFIC FILTERING

Uses a combination of white-list and blacklist approaches, and introduces a concept of application profiling. This preventive layer protects against: Cross Site Request Forgery (CSRF), Cross Site Scripting (XSS), Remote File Inclusions (RFI), SQL Injection (SQLi), Local File Inclusions (LFI), Malicious post requests, Malformed cookie requests, Malformed headers, Layer-7/HTTP Denial of service attacks, Malicious or Improperly used bots or other similar attacks.

NETWORK LEVEL DDOS PROTECTION

Before traffic even makes it to your server, it undergoes intense scrubbing (UDP, TCP and ICMP Defence) forwarding clean, legitimate traffic.

CLOUD BASED IPS

Our Intrusion Prevention and detection systems will correlate all the requests and try to find patterns of attacks that could be missed by just the WAF (1st level of defence).

WEB APPLICATION FIREWALL

Web Application Firewall (WAF) and Intrusion Detection System (IDS) for websites. In short, it’s a cloud-based perimeter protection for websites

THREAT INTELLIGENCE CENTRE

Our Cyber Threat Watch team will look over the logs and activity, and identify any security issue or pattern that needs to be blocked or white listed. Your site will benefit from the intelligence we are gathering from all the activity we see across all our clients.


HOW MANAGED WEB DEFENCE SERVICE WORKS?