Flexible (shared) engagement model based on available internal resources and technology

We either use our SIEM technology or yours to Monitor and Detect threats as they happen 24 hours a day, 7 days a week. Typically Secure ISS will perform all Monitoring & Detection services with end user internal resources undertaking all response and remediation activities but variations to this model are available.


Example: Co-Managed SIEM

  • This approach enables your internal resources to focus on activities that require organisation-specific knowledge
  • Our Co-Managed SIEM service allows an organisation to have more control over its logs, processes, activities and operations