Service Menu
The mission is simple: serve economical Security-As-Services packages that customers will want to return to month after month.
CYBER THREAT WATCH SERVICE PACKAGE
24×7 CYBER THREAT MONITORING SERVICE
Our security operation's centre gives 24-hour monitoring and provides Low, Medium and High Response based on the level of Cyber Threats detected by Thoughthive's Threatsentinel.
THREAT ANALYSIS, INCIDENT RESPONSE AND REPORTING SERVICE
Support during the process of incident identification, investigation, response and containment, rectification and monitoring
SECURITY AND COMPLIANCE REPORTS
Thoughthive's Cyber Threat Watch Centre’s reports via Threatsentinel aids in incident investigation and documentation, and includes reporting packs for PCI, SOX, HIPAA, GLBA, FISMA and ISO
ACTIONABLE ALERTS SERVICE
Attack alerts provided by Thoughthive's Cyber Threat Watch Centre incorporate a clear, plain-language description of the underlying attack and the risk it poses, pinpointing the exact resources that may have been affected, and recommending what immediate actions should be taken to mitigate it.
ZERO-DAY ATTACK IDENTIFICATION
Thoughthive's Cyber Threat Watch Centre uses powerful behaviour-based analysis via Threatsentinel to identify new attacks that can bypass signature-based countermeasures
CENTRALIZED EVENT LOGGING MANAGEMENT AND STORAGE (THREATSENTINEL @CUSTOMER PREMISE)
Thoughthive's Cyber Threat Watch Centre rapidly investigates incidents and provides easy access to all incident data, raw logs and correlated records via Threatsentinel system
HOW CYBER THREAT WATCH SERVICE WORKS?
MANAGED WEB DEFENCE SERVICE PACKAGE
VIRTUAL WEBSITE PATCHING
Our service will virtual patch your site on our cloud infrastructure making sure that those vulnerabilities can't be used against you.
MALICIOUS TRAFFIC FILTERING
Uses a combination of white-list and blacklist approaches, and introduces a concept of application profiling. This preventive layer protects against: Cross Site Request Forgery (CSRF), Cross Site Scripting (XSS), Remote File Inclusions (RFI), SQL Injection (SQLi), Local File Inclusions (LFI), Malicious post requests, Malformed cookie requests, Malformed headers, Layer-7/HTTP Denial of service attacks, Malicious or Improperly used bots or other similar attacks.
NETWORK LEVEL DDOS PROTECTION
Before traffic even makes it to your server, it undergoes intense scrubbing (UDP, TCP and ICMP Defence) forwarding clean, legitimate traffic.
CLOUD BASED IPS
Our Intrusion Prevention and detection systems will correlate all the requests and try to find patterns of attacks that could be missed by just the WAF (1st level of defence).
WEB APPLICATION FIREWALL
Web Application Firewall (WAF) and Intrusion Detection System (IDS) for websites. In short, it’s a cloud-based perimeter protection for websites
THREAT INTELLIGENCE CENTRE
Our Cyber Threat Watch team will look over the logs and activity, and identify any security issue or pattern that needs to be blocked or white listed. Your site will benefit from the intelligence we are gathering from all the activity we see across all our clients.