Flexible (shared) engagement model based on available internal resources and technology
We either use our SIEM technology or yours to Monitor and Detect threats as they happen 24 hours a day, 7 days a week. Typically Secure ISS will perform all Monitoring & Detection services with end user internal resources undertaking all response and remediation activities but variations to this model are available.
Example – Co-Managed SIEM
- This approach enables your internal resources to focus on activities that require organisation-specific knowledge
- Our Co-Managed SIEM service allows an organisation to have more control over its logs, processes, activities and operations