Purpose-Built to Protect Your Highest Risk Assets
Finding highly qualified, experienced professionals to join your in-house security team is challenging. Organizations around the world are fiercely competing for a limited number of professionals with the unique combination of technical acumen and soft skills needed to maintain and enhance an organization’s security posture. Businesses dependent only on in-house security teams are finding themselves in a quandary as they know they are lacking the security expertise to protect their IT estate.
Fortra’s Alert Logic MDR Enterprise is a purpose-built solution that protects your assets all without the expense and hassle of finding and keeping cybersecurity experts on your staff.
KEY FEATURES
- Designated Team of Cyber Risk Experts
- Bespoke threat hunting
- Proactive tuning & detection optimization
- Security posture consultation
- Tailored response playbooks
- Biweekly security review
Schedule My Demo
What You Receive with Alert Logic MDR Enterprise
Designated Team of Cyber Risk Experts
Focused on your security and business requirements, your designated team of Cyber Risk Experts works with your team to advise on your security posture, proactively hunts for threats in your environment, and enhances detection and response capabilities that level up your security maturity.
Threat Hunting
Building upon the emerging threat hunting provided within MDR Professional, our Cyber Risk Experts engage in regular threat hunt activities to boost your defense-in-depth strategy.
Leveraging the intelligence of the Fortra Threat Brain and context and understanding of your business processes, infrastructure, risk points, and control gaps, our team members develop approaches to locate suspicious or anomalous activity within your environment for further analysis, validation, and escalation.
Reporting and Consultation
Your Cyber Risk Experts review and assess activity to identify incident and threat trends unique to your environment. A report detailing key findings and analysis forms the basis of the biweekly discussions and feedback. Key to our goal of enabling you to level up your security posture are the forward-looking recommendations that will feature in these reports. These recommendations will vary but offer your team guidance on actions to prioritize tactical operations and strategic delivery programs.
Proactive Tuning and Sensor Optimization
By working closely with you, our experts will develop a deeper knowledge of your organization, systems, and security controls, and collaborate with you to configure, tune, and optimize our technologies and processes based on your unique profile and change programs. Their focus to reduce noise and false positives and allow you to focus on items that pose a legitimate risk to your business.
SERVICE ELEMENTS | MDR Essentials | MDR Professional | MDR Enterprise† |
Implementation | ◉ | ◉ | ◉ |
24/7 Platform | ◉ | ◉ | ◉ |
Vulnerability | ◉ | ◉ | ◉ |
PCI Dispute & PCI DSS & ASV Program Support | ◉ | ◉ | ◉ |
Tailored Response Playbooks | ◉ | ◉ | |
24/7 Threat Management | ◉ | ◉ | |
15-minute Escalation SLA | ◉ | ◉ | |
Emerging Threat Response | ◉ | ◉ | |
On-demand Tuning & Sensor Optimization | ◉ | ◉ | |
Machine Learning Log Review | ◉ | ◉ | |
Designated Team of Cyber Risk Experts | ◉ | ||
Bespoke Threat Hunting | ◉ | ||
Proactive Tuning & Detection Optimization | ◉ | ||
Security Posture Consultation | ◉ | ||
Biweekly Security Review | ◉ | ||
Annual Virtual Stakeholders Meeting | ◉ |
FEATURES | MDR Essentials | MDR Professional | MDR Enterprise† |
Hybrid Asset Discovery | ◉ | ◉ | ◉ |
Internal & External Vulnerability Scanning | ◉ | ◉ | ◉ |
Cloud Configuration Checks/CIS Benchmarks | ◉ | ◉ | ◉ |
Endpoint Detection | ◉ | ◉ | ◉ |
PCI Scanning | ◉ | ◉ | |
File Integrity Monitoring | ◉ | ◉ | |
Network Monitoring | ◉ | ◉ | |
Log Data Monitoring | ◉ | ◉ | |
Log Collection & Search with 12 Month Retention * | ◉ | ◉ | |
Web Log Analytics | ◉ | ◉ | |
Real-time Reporting & Dashboards | ◉ | ◉ | ◉ |
Cloud Security Service Integration | ◉ | ◉ | |
Cloud Change Monitoring | ◉ | ◉ | |
User Behavior Monitoring | ◉ | ◉ |
* Log retention is always online, no restriction on search window exists and more than 12 months retention is available upon request