1. Xcina virtual Security Operations Centre providing
24/7 enterprise-grade managed security.
WE ARE
GUARDIANS
OF YOUR
DIGITAL ESTATE
2. 2
G U A R D I A N S O F Y O U R D I G I TA L E S TAT E
MANAGED
SECURITY
SERVICES
WE ASSESS
Our scanning technology allows us to see
how your environment is configured.
WE DETECT
Our suite of monitoring tools allow us to
detect intruders immediately.
WE RESPOND
Our robust processes contain events
before they impact your business.
WE PROTECT
We apply the best of enterprise and
government cyber security practices.
We believe that all businesses should have access to
enterprise-grade security, because for too long, many
small and medium sized businesses have endured
excessive cyber risk due to prohibitive costs. We have
designed our security services from the bottom up,
providing a top-end service at an economical price.
3. MONITORING
3
X C I N A M S S P
NETWORK AND HOST MONITORING
We install a probe on your network to
monitor the traffic passively, so we can
detect and contain any incidents.
INCLUDES...
VULNERABILITY
SCANS
We identify the
digital assets that
have vulnerable
applications or
are missing critical
patches, providing
the information
to activate
improvements.
ASSET
DISCOVERY
We take stock
of all networked
digital assets
to develop an
understanding
of your business
environment. This
ensures we can
manage events.
HOST-BASED
INTRUSION
We provide deep
visibility into
your complete
environment,
even when
events occur
while devices are
outside of the
network.
4. G U A R D I A N S O F Y O U R D I G I TA L E S TAT E
MALICIOUS
CONTENT
We alert you
immediately
when malicious
content has
been detected,
ensuring removal
before attackers
gain a foothold.
ACCEPTABLE USE
VIOLATIONS
Enforcing policy
is often the
cornerstone of
effective cyber
security governance,
so we report on
unauthorised usage
of software or
devices.
WEEKLY INCIDENT REPORTING
We provide a weekly summary of every
event, and the process we have taken to
respond and remediate.
REPORTING
INCLUDES...
BEHAVIOURAL
ANALYSIS
We investigate
event correlations
across your assets,
allowing us to
report on facts
pertaining to
potential internal
or external threat
actors.