Security-as-a-service involves organizations leveraging third-party consultants and managed security service providers (MSSPs) to monitor the security of their infrastructure. Whether it is the need for log management, threat detection, SIEM-as-a-service, or compliance, many are choosing to outsource this service versus building the capability internally. Cost savings and overcoming staffing and skills gaps are motivating factors for outsourcing day-to-day security functions.
X10 Technologies is a security-as-a-service provider leveraging the power of award-winning AlienVault Unified Security Management™ (USM™) platform for security monitoring (asset discovery, vulnerability assessment, intrusion detection, behavioural monitoring, and SIEM log management and correlation.). The all-in-one AlienVault USM platform delivers essential security controls and seamlessly integrates real-time threat intelligence from AlienVault Open Threat Exchange™ and the AlienVault Labs team to quickly identify threats affecting your network and prioritize actionable response, within minutes of deployment.
Whether it be hardware devices, a virtual platform, or a cloud firewall. Our 24/7 operations monitor device states and alerts in real-time and will record the event by creating an incident. Our monitoring tools provide a real-time view and reporting of the device state. Our technical team not only keeps track of your up-time and down-time but also validates and determines the causes of the issue for each event. We are continuously monitoring system resources and the performance of systems and networking devices.
X10 Technologies specializes in providing Managed Firewall Services leveraging over a decade of experience in managing security policies and operations across various technology platforms.
Today, we help companies of all sizes successfully leverage their technology investments.
Our Network and Security Operations Center support team provide turn-key operations and 24/7 monitoring and notification services. X10 Technologies understands the importance of specific and critical devices to be monitored in order to reduce the risk of non-compliance and increase corporate security posture.
X10 Technologies will ensure that the proper elements and commitments are in place to provide consistent IT service support and delivery to hour organization. X10 Technologies will act as a primary support contact and will troubleshoot and provide resolution to production and non-production systems. X10 Technologies’ designated resources will also be tasked with preventative work in order to reduce incidents as much as possible.
X10 Technologies will work to define a set of operational procedures and will execute the tasks as per defined schedule. We will proactively monitor systems and applications to prevent any identified issues that will have an impact on your company’s day to day operations.
X10 Technologies will work with internal resources and external vendors to address any specific system/network/application issues that pertain to production and non-production environments.
X10 Technologies will assist with system/device updates and patching of production and non-production firewall devices.
Regular schedule will be determined based on existing requirements and policies in place. If not in place, X10 Technologies will prepare a schedule that may include after business hour tasks (automated and/or manual, scheduled and/or on demand).
Note: Updates and patching may require outages. Details of the outage will be communicated with business and get prior approval.
X10 Technologies will work to define a set of operational procedures and will execute the tasks as per defined schedule to perform the following tasks:
X10 Technologies provides a 24/7 help-desk operation and monitoring service. The service is fully managed and hosted by X10 Technologies. Our agents cover a full 24/7 shift with an additional fail-over option to a call-center. This ensures highly available customer support operations.
X10 Technologies will provide scheduled reports as requested and agreed during the on-boarding process.
The overall objective of the engagement is to test, investigate, analyze, and report on the level of risk associated with any security vulnerabilities discovered during the assessment. The goal is to provide your organization with appropriate mitigation strategies to address those discovered vulnerabilities. The Risk-Based Security Vulnerability Assessment methodology has been designed to comprehensively identify, classify and analyze known vulnerabilities in order to recommend the right mitigation actions to resolve the security vulnerabilities discovered.
As a part of this engagement, X10 Technologies will deliver on the following services:
Enumeration involves active connections to the systems and direct queries. Some additional operations and techniques used include:
For identified systems, X10 Technologies will provide a port to service level mappings for TCP and UDP as a component of reporting. As port-scanning results will be integral to identifying hosted applications, services indicative of applications will be catalogued and used to create an inventory of applications included in later assessment phases.
Using the information gathered during the testing (e.g., operating system versions, applications, and open services), the X10 Technologies team will perform research on the vulnerabilities that may affect the specific target systems. The team will then attempt to confirm if these vulnerabilities actually exist on the system.
This phase will leverage information gathered initially to perform a detailed assessment against industry best practices, taking into account your considerations.
At a high-level, the security operations review consists of: