PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

Similar documents
SOLUTION OVERVIEW. Smooth initial setup and business continuity ensured by ESET experts

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

What is a mobile protection product?

PRODUCT OVERVIEW. Extend your security intelligence from local network to global cyberspace

What is an Endpoint Protection Platform?

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

Microsoft Security Management

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Commercial Product Matrix

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

Managed Endpoint Defense

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Cybersecurity experts on your side. Your enterprise cybersecurity partner trusted by customers and analysts alike

PT Unified Application Security Enforcement. ptsecurity.com

RSA INCIDENT RESPONSE SERVICES

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

Security Made Simple by Sophos

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting organisations from the ever evolving Cyber Threat

RSA NetWitness Suite Respond in Minutes, Not Months

ForeScout Extended Module for Splunk

MANAGED DETECTION AND RESPONSE

A Comprehensive Guide to Remote Managed IT Security for Higher Education

RSA INCIDENT RESPONSE SERVICES

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Managed Security Services - Endpoint Managed Security on Cloud

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

Security Operations & Analytics Services

INTRODUCING SOPHOS INTERCEPT X

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Continuous protection to reduce risk and maintain production availability

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

A Data-Centric Approach to Endpoint Security

Reducing the Cost of Incident Response

Securing Your Digital Transformation

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

FOR FINANCIAL SERVICES ORGANIZATIONS

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

What It Takes to be a CISO in 2017

Put an end to cyberthreats

deep (i) the most advanced solution for managed security services

Cisco Start. IT solutions designed to propel your business

Click to edit Master title style. DIY vs. Managed SIEM

CYBER RESILIENCE & INCIDENT RESPONSE

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

From Managed Security Services to the next evolution of CyberSoc Services

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

The European Company that protects the world

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

SIEMLESS THREAT DETECTION FOR AWS

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

PREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Technical Overview. Elastic Path Commerce

align security instill confidence

Cybersecurity The Evolving Landscape

BETTER Mobile Threat Defense (BMTD)

Services solutions for Managed Service Providers (MSPs)

May the (IBM) X-Force Be With You

HOSTED SECURITY SERVICES

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

Changing the Game: An HPR Approach to Cyber CRM007

STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO

with Advanced Protection

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

MaaS360 Unified Mobility Management

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Security-as-a-Service: The Future of Security Management

Sage Data Security Services Directory

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Act! in the Cloud. Finding your path to success with hosted CRM

RSA ADVANCED SOC SERVICES

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

to Enhance Your Cyber Security Needs

Temenos Bringing banking to millions through Cloud Scale Innovation

COMPANY VISION 기업의생산성향상에기여하는최고의협업솔루션을제공하는최고의클라우드기업솔루션공급사

Background FAST FACTS

Transcription:

PRODUCT OVERVIEW On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

What is a Threat Hunting service? ESET Threat Hunting service helps customers investigate a certain set of data, events and alarms generated by ESET s endpoint detection and response solution ESET Enterprise Inspector. This allows organizations full forensic investigations without the need for dedicated staff or resources.

Why ESET Threat Hunting service? GET THE MOST OUT OF ESET S EDR ESET Enterprise Inspector is a sophisticated EDR tool for identification of anomalous behavior and breaches, risk assessment, incident response, investigation and remediation. It monitors and evaluates all activities happening in the network in real time and allows organizations to take immediate action if needed. ESET Enterprise Inspector is a prerequisite for ESET Threat Hunting service. LACK OF PRODUCT KNOWLEDGE Utilizing new products without any previous knowledge can become tricky even for organizations with dedicated security or IT teams. In addition, keeping up with the rapidly changing cyber threat landscape can be challenging and sometimes best left to experts. LACK OF MANPOWER Helps security teams and IT administrators prioritize their workload by pinpointing only the important events. In addition, an organization can take months to hire and train a team to implement and monitor an Endpoint detection and response platform. REST EASY If any anomalies or breaches are identified, our experts can quickly find the root cause and remediate the issues that were found for good. LONG-TERM COSTS Creating dedicated teams and/or hiring specialists to perform niche occasional tasks can incur high long-term costs. Purchasing products and services from a single vendor reduces complexity for accounting departments especially for multinational corporations that would otherwise be left with a large number of regional providers.

Keeping up with the rapidly changing cyber threat landscape can be challenging and sometimes best left to experts. An organization can take months to hire and train a team to implement and monitor an Endpoint detection and response technology.

ESET Threat Hunting service technical features ON-DEMAND Organizations contact ESET Threat Hunting operators when they require Threat Hunting services. ROOT CAUSE ANALYSIS Threat Hunting operators review highlighted alarms to determine their root cause. ACTIONABLE ADVICE ON-PREMISE DATA All threat and organization data continue to stay on-premise by setting up a secure VPN connection between ESET and the organization. INITIAL ASSESSMENT A thorough initial assessment is completed to assess the specific organizations security policies as well as develop an internal profile. Operators review alarms and compile their findings into a comprehensible status report as well as provide actionable advice to the organization. SUBSCRIPTION BASED Organizations purchase Threat Hunting services in customizable time blocks during which ESET experts are ready to investigate threats when most needed.

The stages Initial assessment Regular operation Each service starts with an assessment of not just the customer s environment but organizational composition and general cybersecurity attitude. A full interview is completed with relevant organizational staff members to collect all required information. When requested, ESET Security experts begin the investigation of pinpointed events to determine their root cause and provide actionable advice customized to the specific organization. Findings from each investigation are compiled into comprehensible status reports that express technical details in human-readable language. The result of this phase is an Organization Security Profile which can be consulted in the future by any Threat Hunting operator that requires specifics related to the organization to make correct judgments. Organizations are recommended to contact ESET with any changes to their environment due to the on-demand nature of the Threat Hunting service.

Recommended services ESET THREAT MONITORING Continuous Enterprise Inspector monitoring to prioritize workloads and alert customer s security teams of any potential threats in real time. ESET PREMIUM SUPPORT Gives you 365/24/7 access to customer care specialists with years of experience in IT security. ESET DEPLOYMENT & UPGRADE SERVICE Fast, seamless security product deployments and upgrades to ensure business continuity. ESET AUTHORIZED TRAINING CENTER Certified training programs that improve your team s skill set and bring them up to speed on the usage of new security solutions. We were most impressed with the support and assistance we received. In addition to being a great product, the excellent care and support we got was what really led us to move all of Primoris systems to ESET as a whole. Joshua Collins, Data Center Operations Manager; Primoris Services Corporation, USA; 4.000+ seats The implementation was very straightforward. In cooperation with ESET s well-trained technical staff, we were up and running our new ESET security solution in a few hours. IT Manager; Diamantis Masoutis S.A., Greece; 6.000+ seats

About ESET ESET a global player in information security has been named as the only Challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.* For more than 30 years, ESET has been developing industry-leading IT security software and services, delivering instant, comprehensive protection against evolving cybersecurity threats for businesses and consumers worldwide. ESET is privately owned. With no debts and no loans, we have the freedom to do what needs to be done for the ultimate protection of all our customers. ESET IN NUMBERS 110m+ users worldwide 400k+ business customers 200+ countries & territories 13 global R&D centers ESET EMPLOYEES ESET REVENUE More than a third of all ESET employees work in Research & Development in million 500 1,400 400 300 700 200 100 1987 1997 2007 2017 2 1987 1997 2007 2017 0 *Gartner does not endorse any vendor, product or service depicted in its research publications. Gartner research publications consist of the opinions of Gartner s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

SOME OF OUR CUSTOMERS protected by ESET since 2011 license prolonged 3x, enlarged 2x protected by ESET since 2008 license prolonged/enlarged 10x protected by ESET since 2016 more than 14.000 endpoints ISP security partner since 2008 2 million customer base SOME OF OUR TOP AWARDS Given the good features for both anti-malware and manageability, and the global reach of customers and support, ESET should be on the shortlist for consideration in enterprise RFPs for anti-malware solutions. KuppingerCole Leadership Compass Enterprise Endpoint Security: Anti-Malware Solutions, 2018