• HOME

  • ABOUT US

  • SERVICES

  • CONTACT

  • KNOWLEDGE

  • BUY ONLINE

  • More

    CYBER SECURITY ASSESSMENTS // PENETRATION TESTING // DATA SECURITY // IT SECURITY // SECURITY AUDITS // DIGITAL FORENSICS // CYBER INTELLIGENCE

    WHAT'S INVOLVED IN OUR 24/7 SECURITY SERVICES?

     

     

    Our process combines cloud-based technology, highly-trained

    security experts and a security response team who take action

    on any incidents targeting your network

     

    Collection: The process begins by collecting the most basic

    elements of cyber-threat monitoring: the event log (machine

    data) and configuration/performance (health check) data.

     

    Correlation: This data is securely transmitted to the cloud, in

    real-time, where automated cyber-threat detection technology

    sorts through millions of events through a complex

    process called correlation.

     

    Experience: The correlation rules used have been developed

    over nearly 15 years by world-leading security technologists

    and are constantly being updated and improved to ensure

    new threats are identified.

     

    Intelligence: Discovered security alerts are escalated to a

    team of highly trained experts who perform a deep triage

    process by means of human inspection. This “eyes on”

    scrutiny definitively pinpoints security incidents which require

    attention to remediate.

     

    Response: Finally, a response team member will act on the

    threat to neutralize or eliminate it - ensuring the risk to your business is reduced.

    Important for your business:

     

    Cyber-threat monitoring and detection are

    the cornerstones of an effective IT security

    strategy. But collecting the right data,

    parsing and analyzing it into manageable

    and useful pieces of information is an

    extremely complex task.

     

    Our 24/7 security service employs

    automated technology, paired with a staff

    of security experts, to reduce the risk and

    complexity of protecting your critical

    network systems.

    Contact us today

    for a no-obligation

    quote on a

    24/7 cyber-threat

    monitoring program.

    Protect your network from these threats and more:

     

    •Port scans, host scans, denied scans, sudden

    change of traffic between certain IPs or other

    anomalies in traffic.

     

    •Network server/device and admin logon

    anomalies – authentication failures at all times

    and unusual IPs.

     

    •Network access irregularities from VPN,

    wireless logons and domain controller.

     

    •Account lockouts, password scans and unusual

    logon failures.

     

    •Rogue endpoints, wireless access points.

     

    •Botnets, mail viruses, worms, DDOS and other

    “day zero” malware identified by

    cross-correlating DNS, DHCP, web proxy logs

    and flow traffic.

     

    •Abnormalities in web server and database

    access

    Leaflet THS.PDF
    Leaflet THS.PDF
    Advanced Threat Landscape THS.PDF
    Advanced Threat Landscape THS.PDF

    Advanced Persistent Threat ( APT ) Learn More>>>

    Trojan 1 | PCI Compliance | HIPAA Compliance | GLBA Compliance | GDPR Compliance | Penetration Testing | Web Application Assessment | Corporate Security Assessment | Cyber Threat Intelligence 24 / 7

     

    Cyber Breach Lawyers | Vulnerability Assessments | CISO On Demand | Black Ops | Secure Cloud | Personal Security Assessments | Small Business IT Security  | NY Cybersecurity Rule 23 NYCRR 500

     

    Ethical Hacking for Small Businesses | IT Compliance Small Business | Security Breach Management Solutions | Big Data Security | Corporate Randsomware

     

    Website Security for Small Businesses | Security Consulting Services | Enterprise Security Services | Drone & Robotic IT Security

     

    Complete IT/Cyber Security Assessment |  Security Governance Services | Security & Risk Management | Digital Forensics

     

    Social Engineering Testing  | Cyber Liability Insurance | Data Centers Transformation & Security | Secure Access and Continuity Solutions

     

    Mobility Management  & Security | Network Management  Security Solutions | EndPoint Security Solutions |  National Vulnerability Database

    2200 PENNSYLVANIA AVENUE | NW | 4TH FLOOR EAST​ | WASHINGTON, D.C. 20037​

    ​​Tel: 202.507.5773 | Fax: 202.507.5601​ |  ContactUs@TrojanHorseSecurity.com

     

    • s-linkedin
    • s-facebook
    • Google Metallic
    • YouTube Metallic
    • Pinterest Metallic
    • s-tbird

    © 2020  TROJAN HORSE SECURITY INC

    • HOME

    • ABOUT US

    • SERVICES

    • CONTACT

    • KNOWLEDGE

    • BUY ONLINE

    • More