We monitor your IT and OT infrastructure 24/7 to comprehensively detect attacks and deliver a quick and effective response. We provide Tier 1, 2 and 3 services for our customers based on a fully managed or hybrid model. Our Security Operations Center is located in Haarlem and our analysts are in Dutch and English.
SIEM products: RSA Netwitness; Microsoft Sentinel
We monitor all individual server and client systems within your organization 24/7. As a data source for our SIEM solutions, we use all available EDR solutions. We provide autonomous EDR services for our customers based on the EDR solutions we manage. Our Security Operations Center is located in Haarlem and our analysts are in Dutch and English.
EDR products: Microsoft Defender for Endpoint; CrowdStrike
We monitor all your organization's network traffic 24/7. As a data source for our SIEM solutions, we use all available IDPS solutions. We provide autonomous IDPS services for our customers based on the IDPS solutions we manage. Our Security Operations Center is located in Haarlem and our analysts are in Dutch and English.
IDPS products: Fortinet; Palo Alto
An integral part of all monitoring services is analyzing behavior. Individual behavior, organizational behavior and behavior of third parties. To do this, we make use of artificial intelligence and machine learning techniques. These enable us to detect abnormal behavior early, which may be an indication of an active cyber attack.
New vulnerabilities in software are found every day. Vulnerabilities receive a CVE score that indicates the threat level of a vulnerability. In addition to a CVE score, a vulnerability often also has advice on what to do to remedy it. Whether the advice is followed immediately depends on its business impact.
Our basis consists of providing good and independent advice. What is important here is that we are autonomous, curious and eager to learn about the customer's business processes and are transparent in our communication with the customer.
The basis of our services starts with Interest and Deepening in your organization. This is the only way your organization can be properly protected.