NTG’s Managed Security Service is a consolidated Security Information and Event Management (SIEM) solution providing a bird’s eye view of your IT infrastructure that monitors your system for security threats and anomalies 24/7/365. It fulfills two main objectives:
- Detecting in (near) real-time security incidents.
- Efficiently managing logs.
From a high-level point of view, NTG’s SIEM collects information (e.g., logs, events, flows) from various devices on the network, correlates and analyzes the data to detect incidents and abnormal patterns of activity, and, finally, stores the information for later use (reporting, behavior profiling, etc.). Not only does our SIEM solution provide real-time threat analysis but also in-depth monthly reporting to provide our customers with a true risk management plan.
NTG’s SIEM solution will help your organization
- Discover internal/external threats.
- Monitor (privileged) user activity and access to resources.
- Provide compliance reporting.
- Support incident response.
- Maintenance and support of the AlienVault SIEM solution.
NTG’s Security Pillars
NTG’s Security Pillars
NTG’s SIEM solution is supported by our specialized server which, when installed in our client’s network, provides our tools with secure access to monitor and backup network device configurations and provide continuous availability in monitoring. Tracking device configurations allows NTG to immediately identify configuration changes that may be related to an incident and when appropriate, restore the previous configuration to restore functionality. NTG prides itself on providing a holistic, proactive approach toward SIEM that is built around NTG’s security pillars.
SIEM
• Log Collection• OTX Threat Data• SIEM Event Correlation• Incident Response
Asset Discovery
• Active Network Scanning• Passive Network Scanning• Asset Inventory• Software Inventory
Vulnerability Assessment
• Continuous Vulnerability Monitoring• Authenticated Active Scanning• Unauthenticated Active Scanning
Threat Detection
• Network IDS (NIDS)• Host IDS (HIDS)• File Integrity Monitoring (FIM)
Behavioral Monitoring
• Netflow Analysis• Service Availability Monitoring
Forensics and Recovery
• Device Availability• Device Configuration Changes
Explore More NTG Services
IT Solutions That Will Elevate Your Business
Discover Vulnerabilities Before They Discover You
Secure your organization’s success and get ahead of your competition.
Book Your Free Cyber Threat Assessment