Unified Threat Detection

CND's unified threat detection provides you with numerous cyber security products in one simple, affordable, scalable solution. 

Service Overview: 

Our consultants work with you to manage your cyber security within a predefined monthly budget. We can either take a supporting role, where our managed service feeds into your existing cyber security capability, or a more active role where we inform other departments and/or executives when an issue has been detected.

Whilst our ever-popular vCISO service provides advice and support, our Unified Threat Detection service installs a virtual sensor inside your network to keep an eye on your security. It is managed by our cyber security staff and we alert you if anything worrying occurs. 

We deploy our Unified Threat Detection sensor (UTD) within your network. This collects all the logs from your devices, monitors the network traffic (IDS), and scans everything inside your network for vulnerabilities which an attacker might exploit. It also monitors cloud services such as Office 365, G-Suite, and AWS.

We manage and monitor the output while you can view the systems security outputs in one simple dashboard. The sensor also allows us to quickly map your assets, set access notifications on critical data files, and detect intrusions or suspicious behaviour to support your GDPR and PCI compliance and ISO27001 certification.

  • Detect the latest threats with a single low-cost and easy to manage sensor that can replace multiple security software products.
  • Prioritise the threats that put your business at risk. Quickly attaining compliance for GDPR, ISO27001, and PCI DSS.
  • Outsourced configuration management and analysis by professionals producing high level, easily digestible reports.

Multiple Security Solutions in One

Know what devices are within your environment, what Operating Systems, and what applications.

Correlate and analyse event data from across your environment.

Identify vulnerabilities within your internal network and externally accessed addresses and web applications.

Be alerted to suspicious network activity from an inbuilt network IDS and Netflow sensor and receiver.

Enable security analysts to perform full protocol analysis on network traffic.

Regular analysis of your event data against the latest threats, with advice on new attacker techniques and the most effective defences.

Detect if your user's credentials have been compromised in a 3rd party breach and trafficked on the dark web.
Establish a baseline and identify anomalous or suspicious behaviour in your environment.

Threat detection capabilities are enhanced by automatically collecting and providing Windows and Linux system information.

Want to book a service?
See a job opening you like?
Want something bespoke?

© Computer Network Defence Limited 2019