We Understand Your Cyber Security Issues
You have challenges in assembling all the modules & appliances that you need to provide complete prevention, detection and reaction
You have challenges in integrating these components so that they talk to each other
You have challenges in keeping these components current and future-proof
You have limited specialist staff, and you don’t want them consumed by chasing all the events flagged by your systems
You have a limited budget and can’t afford the cost of acquiring, installing and operating all these software tools
Our Product suites solve all these issues
Our modules provide best-in-class functionality in many of the key areas
Our integration layer integrates these components so that they talk to each other
The architecture is plug-n-play, thereby keeping these components current and future-proof
Our automation layer deals with all the routine tasks, and flags (creates service tickets) for exceptions that require manual intervention
The cost of acquiring, installing and operating our software tools will be a pleasant surprise for you – we are simply best-in-class for TCO
Our vulnerability assessment software monitors your networks and assets in real time, conducting an assessment in the three dimensions of TECHNOLOGY + PEOPLE + PROCESS (our competitors only assess Technology).
Thus we can give a full compliance report against all the leading standards, such as ISO27001, NIST 800-53, C2M2, ICS-CERT, FFIEC, PCI etc.
Our event management and analytics software uses an agentless approach to collect the log files from all your assets, and identify real compromise attempts in real-time.
We use cross-correlation throughout all your devices, and correlation with the leading threat intelligence feeds, to identify the real positives from all the false positives. We can even detect impersonation attacks, and disillusioned insider behavior.
the average cost of a data breach is now over $7 million according to research by the Ponemon Institute
Most US states require private and public sector entities to notify individuals of security breaches of information involving personally identifiable information. In 2016, average notification costs were $0.6 million
In a survey of 2,000 adults across the US in 2016 by independent technology market research specialist Vanson Bourne, 76% said they would move away from companies with a high record of data breaches
The average time it takes a company to detect a cyber compromise
On average it takes 46 days to resolve a cyber attack at an average cost of $21,155 per day, or a total cost of $973,130
Every day, the average mid-cap company with 100 employees generates 30,000 alerts of potential anomalous events. 99% turn out to have no material impact.
Detection is key. If you don’t detect a breach, you obviously can’t respond to it. How does your staff deal with 30,000 alerts daily?
The attackers don’t respect normal working hours. Do you operate your response team round the clock, weekends, holidays…?
The average mid-cap company has 3 specialist staff overseeing data security, during working hours only. ICS provides 365×24 coverage for half that cost, along with comprehensive insurance to comfortably cover the $7 million costs of typical breaches.detect a cyber compromise
Sources: 1. Ponemon’s 2016 Cost of Data Breach Study: United States; 2. Ponemon’s 2015 Global Cost of Cybercrime Study; 3. Ponemon’s 2015 Cost of Cyber Crime Study: Global; 4. Ponemon’s 2016 Cost of Data Breach Study: United States; 5. Ponemon’s 2016 Cost of Data Breach Study: United States; 6. Ponemon’s 2015 Cost of Data Breach Study: Global Analysis