Cyber Defense Services

Cybersecurity Echtzeit

Real-time monitoring of your data-7x24 and managed

Proactive monitoring is essential to ensure effective and needs-based protection against cyber threats. But what data? And how can I draw the right conclusions from the data? And act early instead of reacting?

 

Protection against cyber threats in a fast and digital age

A modern security system focuses on the relevant data. Together with the customer, we define the relevant data and data sources (also known as vectors) that need to be protected. The customer's specific setup is taken into account - for example, whether a dedicated solution is already in use for endpoint protection.

In order to act quickly and in a targeted manner, we operate a detection-&-response-platform that not only collects the defined telemetry data (ingest), but also normalizes it, enriches it with context (business-context and threat intelligence) and finally processes it automatically. This ensures that we can detect incidents in less than 15 minutes and block them directly if necessary.

Needs-based and modular implementation

Modularity in all directions is key to being able to guarantee needs-based protection. Modularity in terms of technical modules as well as volume. And always in both directions (more volume but also less, more modules but also less).

Selectable modules. A central platform for analysis, detection & response.

Cybersecurity 24x7 Monitoring

Vulnerability management (identify and close vulnerabilities)

Regularly scan for vulnerabilities (infrastructure and applications) and analyze the risks for the customer. Make specific recommendations and act directly if necessary.

Icon Shield Checkmark

Mail Security (protection of your email-inboxes)

Emails are still one of the most critical vectors for attacks. With this module we protect your email inbox (phishing, BEC, fraud, etc.)

Endpoint Security (endpoint protection)

The endpoint (whether desktop, notebook or server) is a central component of your organization. Proactive monitoring of the endpoint is central.

Identity Security (protection of identities)

Protecting digital identities is crucial in a global world. With this model we recognize whether identities have been stolen or misused (leaked & misused identities, password-spray or leveraging of MFA, etc.).

Data & Application Security (protection of files and cloud applications)

Fileservers, sharepoints, teams and other cloud-applications need adequate and proactive protection. DLP (Data Loss Prevention) is also part of this module.

Infrasturcture & Cloud Security (infrastructure and cloud protection)

Protection of your Azure infrastructure and the associated cloud-workloads.

Customer-specific requirements

Do you have your own in-house application that also needs to be monitored? Or onpremise components that need to be integrated? With this module we onboard individual requirements.

Benefits

Based on the Microsoft ecosystem: No additional or separate licenses.

Full service pay per use: Complete service is billed according to actual active users per month.

No hidden costs: No chargeable additional services (analysis per incident, etc.)

Contact

Do not hesitate to contact me.

Markus Kaegi

Business Unit Lead - Cyber Security

markus.kaegi@isolutions.ch
Markus Kaegi

Successes & News

More about Cybersecurity