The Endpoint Challenge.

An endpoint is any device that has access to or stores your sensitive information that can be used maliciously or negligently to disrupt your business or exfiltrate your data. Devices such as desktops, laptops, servers and mobile devices. The endpoint has the potential to be the weak link in your cyber security defences. Developing a strategy to mitigate this risk requires people, process and technology. To understand our approach to the technology, have a look at our Endpoint Solutions page.

Once you have the technology in place, you need to focus on getting the best from your investment. This requires an experienced Security Operations Centre (SOC) to makes sense of the high volume of alerts that endpoint devices generate, to spot that one alert that tells you something bad might be happening. However, before you can spot that alert, you need to develop use cases that map onto your risk and define what activity and behaviour you are looking for in the first place.

Most organisations today, public or private, operate a lean IT service delivery model. Having enough staff to keep things running, perform essential maintenance, deliver new projects and security operations is a real challenge. The attacks are growing in volume and becoming more sophisticated. When an attack happens, the time to detect it is the critical factor to containment and recovery. If your IT is already stretched, you could be relying on a healthy dose of luck to pick up that one alert that could be the difference between a minor incident and major business disruption, financial loss and damage to your organisations reputation.

You need Centri.

We have been delivering Managed SOC services for our customers for a number of years. We thought it was time to take this proven service and create a turnkey managed endpoint security service that packages the technology and people/process into an easy to consume managed service that we call Centri.

We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behaviour analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users. It doesn’t matter to us whether your data is on-premises, in the cloud or a hybrid, our technology can monitor how your endpoints interact with it.

Once we received an alert from an endpoint, we utilise threat intelligence, automation and pre-define response playbooks to provide fast and accurate triage. When an incident is identified, our SOC swings into action. We manage the incident for you and coordinate with IT team to contain the attack. Once containment is achieved, we work hand in hand with your team to recover your systems (if required) and then produce the evidence log to drive service improvement and supply information to the police or insurance provider (if required).

Centri has been designed to deliver clear benefits such as improved protection/detection, faster incident response and better visibility for the business. We believe that we can deliver all this for less than you buying the technology and delivering the service in house.

Centri can cover all your client devices (desktops, laptops, mobile) and your servers. We also offer Centri for Networks.

 

Contact us about Centri:

We can run a free endpoint assessment and help you build your business for Centri. 

 
Centri Logo - without strap.jpg