Critical Capabilities for MDR Services - What to Know Before You Buy
The document discusses critical capabilities for Managed Detection and Response (MDR) services, highlighting their evolution and importance due to the lack of internal cybersecurity expertise. It outlines key features such as network traffic analysis, endpoint monitoring, and lightweight incident response, emphasizing the need for tailored solutions to combat modern threats. The document also compares MDR and Managed Security Services (MSS), warning buyers to critically evaluate MSSPs transitioning to MDR offerings.
#2 Critical Capabilities for MDR Services – Public Presentation
Fidelis Cybersecurity, Inc.
#18 While we have many customers who rely on our products, many do not have the teams or skillsets to leverage the full value of our detection and response capabilities, so we also offer a 24x7 MDR service with our IR and SOC experts running our platform.
You only see alerts that are critical to your business.
We can hunt for threats before they reach critical mass and we can eradicate threats from your environment.
All of this allows you to focus on your primary business.
#20 The Fidelis Security Consulting Services team is comprised of industry-leading forensic experts, experienced network security engineers, and dedicated malware reverse engineering specialists who use their deep understanding of malware tactics, techniques, and the advanced threat landscape to stop exploitation by attackers.
Our security consulting team combines experience and expertise to respond to advanced malware attacks, insider theft of IP, and coordinated attacks across a multitude of government and commercial sector clients.
#21 Here we discuss the phases of a breach and how we support counsel
What are the 3 or 4 basic questions….how did they get in, what did they take/see, how many, are they still here?
Program Managers & Architect assigned to each engagement
Facilitate Communications between counsel and client, handling privilege
Effective coordination with IT and Security team of client, and use of their tools
Solid acquisition of evidence and chain of custody (logs, images, Columbia Facility);
Monitoring capabilities during and after the breach, through the incident lifecycle.
Scale resources up or down as needed, handle remote breaches;
SOW is focused; People are former DoD/Law Enforcement, respect confidentiality (Sony and Target reputation damage resulting from leaks)