Your network is under attack right now.
SECURITY OPERATIONS and INCIDENT RESPONSE PLATFORM
Today, organizations utilize numerous security products; most are standalone, complex, and too slow to catch modern-day attacks. Hackers are also relying more on “living-off-the-land” strategies: leveraging existing IT technologies and user accounts for malicious purposes. As a result, detecting and analyzing hacker tradecraft often takes significant time, technical expertise, and resources. Shift-IT’s SHIELD Cyber Security provides an operations and incident response platform that is a gamechanger; it excels at monitoring and catching modern hacking tradecraft, delivering real-time alerts, and allowing for immediate threat response.
SHIELD enables security teams to quickly identify modern hacking tradecraft and take immediate response.
KEY BENEFITS:
- PATENTED LATERAL MOVEMENT DETECTION
- THREAT HUNTING CAPABILITIES
- REAL-TIME THREAT DETECTION AND RESPONSE
- REPORTING AND COMPLIANCE MODULE
- INTEGRATED NONTRADITIONAL IT ASSET
- VISIBILITY AND THREAT DETECTION
– Internet of Things (IoT)
– Operational Technology (OT)
– Building Automation Systems (BAS)
– Industrial Control Systems (ICS)
WHAT IS MDR?
The next generation of managed security service with a focus on real-time threat detection, threat hunting, and active response.
WHY MDR?
Prevention and perimeter protection is no longer sufficient to detect and stop cyberattacks. Neither is expensive, resource-intensive log analysis. Finally, organizations need response, not just recommendations.
“IT security leaders should use managed detection and response (MDR) services to augment existing security monitoring capabilities to address gaps in advanced threat detection and incident response before investing in more security monitoring tools (e.g., security information and event management [SIEM], network, and host-threat detection), and associated staff and expertise.”
Gartner, “Market Guide for Managed Detection and Response (MDR) Services”, May 2016, Bussa. Lawson, Kavanagh
MDR TEAM
- Senior Cyber Security Operators
- Deep Understanding of Hacker Tradecraft
- Continuously Monitors Threat Landscape
- Extensive Knowledge of Networking and Windows Domains
MDR FOCUS
- Lateral Spread Tradecraft
- Infrastructure Enumeration
- Privileged Users and Activity
- Asset Visibility and Remote Access
- Insider Threats
WHAT YOU CAN EXPECT
WORLD-CLASS MDR PROTECTION
24/7/365
1
KICKOFF MEETING
Meet with Shift-IT to assess security requirements and network infrastructure.
2
PORTAL REGISTRATION
Register online to setup your service, manage payments, get updates, and more.
3
IMPLEMENTATION
You, or your IT service provider, deploys SHIELD agent and network taps (if applicable).
4
PLAYBOOK DEVELOPMENT
Shift-IT works with your team to create a customized response playbook in the event of a breach.
See it in action!
SECURITY OPERATIONS & INCIDENT RESPONSE PLATFORM
Learn more or schedule a demo by contacting us.
Microsoft 365 Security Add-on for 24/7 True Managed Detection and Response
Hackers frequently target Microsoft 365 for business email compromise (BEC), information collection, advanced spear-phishing, and breach/ransomware attacks.
THE SOLUTION – Our Microsoft 365 security add-on
Monitoring and Enforcement of Microsoft 365 Activity
When combined with our MDR service, Shield 365 Defense provides around-the-clock Microsoft 365 security monitoring and policy enforcement.
Research shows that hackers are targeting Microsoft 365 accounts with alarming success. Attacks include account compromise via leaked credentials and brute force tactics as well as email impersonation and spear phishing.
With Shield 365 Defense, our cyber analysts can monitor and harden your Microsoft 365 environment and your clients’ 365 accounts.
Security Awareness Training and Simulated Phishing Platform
Helps you manage the ongoing problem of social engineering
Security Awareness Training
Old-school security awareness training doesn’t hack it anymore. Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks.
Baseline Testing
We provide baseline testing to assess the Phish-Prone™ percentage of your users through a free simulated phishing attack.
Train Your Users
The world’s largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Automated training campaigns with scheduled reminder emails.
Phish Your Users
Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates.
See the Results
Enterprise-strength reporting, showing stats and graphs for both training and phishing, ready for management. Show the great ROI!
The System Really Works
We analyzed 6.6 million users over the course of at least 12 months, and our2021 research continues to uncover alarming results. The overall industry initial Phish-Prone percentage benchmark dropped slightly from 2020, but still a troubling 31.4%.
Fortunately, the data showed that this 31.4% can be brought down almost in half to 16.4% within 90 days after deploying new-school security awareness training. The One-Year results show that by following these best practices, the final Phish-prone percentage can be minimized to 4.8% on average. See how your company’s Phish-Prone percentage compares to your peers! The Industry Benchmarking feature is included with your subscription.
Source: 2021 KnowBe4 Phishing by Industry Benchmarking Report
Note: The initial Phish-Prone percentage is calculated on the basis of all users evaluated. These users had not received any training with the KnowBe4 console prior to the evaluation.
Subsequent time periods reflect Phish-Prone percentages for the subset of users who received training with the KnowBe4 console.
COMPREHENSIVE APPROACH
SECURITY MONITORING
- Accounts Created/Deleted
- Altered Administrator Roles
- Too Many Login Attempts
- Sign-in from Unauthorized Country
- Email Impersonation
- SharePoint or OneDrive Files Shared Publicly
- SharePoint Site Deletion
- Accounts Generating Spam
SECURITY POLICY ENFORCEMENT
- Ensure Audit/Mailbox Logs Always On
- MFA Authentication for Administrators
- No Scripting (PowerShell) Privileges for Non-administrators
- Block Dangerous Email Attachments
- Block Mail Forwarding Rules
- Block Third-Party Applications
- Limit External Information Leakage
- Block Top Spamming Countries
WHAT YOU GET
- Alerts Sent Directly To You
- Correlated with other Shift-IT MDR Data Sources
- Integrated Monthly Reporting
- Streamlined Billing
- Simple and Quick Onboarding Process
WHAT YOU CAN EXPECT
Works with Microsoft Exchange Online Plan 1 (including all Microsoft Business plans) and above.