Managed Security
Services Levels

Affordable, Reliable & Simple Managed Security Services

We offer 4 levels of managed security services: (1) BASIC 8/5 and (2) ONLINE 24/7 levels provide for managed security services addressing such tasks as vulnerability analysis, security monitoring and informing about threats. (3) PROFESSIONAL 24/7 level combines managed security services with managed detection & response services covering threat management and incident response. (4) ENTERPRISE 24/7 level adds to the above engagement of dedicated security experts team providing maximal speed & efficiency.


Basic 8/5 Online 24/7

Professional 24/7

Enterprise 24/7

Monthly rate per one endpoint:

€49+

Vulnerability Analysis | MSS Level

Trilight Security manages security risks associated with IT infrastructure through assessment of its weaknesses based on best industry practices. After that we start defining and suggesting adequate corrective activities such as upgrading infrastructure to meet security requirements. Expertise of Trilight specialists and up-to-date vulnerability assessment tools make our audits of your IT infrastructure for vulnerabilities a valuable source of information essential for security tasks. We provide reports for correlation of vulnerabilities with known threats and their prioritization. This ensures duly and quick security updates relevant to customers’ infrastructure.

Security Monitoring | MSS Level

We collect, analyze and correlate logs from your network, applications, operating systems, servers, workstations etc to discover security threats as well as identify and prevent malicious patterns of behaviors that can potentially lead to data compromise or loss. This task, especially correlation part, is truly complex as it takes time and deep understanding of how attackers operate. Things are not made easier by the fact that criminals’ strategies and tactics evolve really fast which brings about the need for constant evolution of correlation rules as well. This is one more important thing that we take care of, as gone are the times when you rely on ready sets of correlation rules only.

Security Monitoring | MSS Level

Indicators of Compromise are unique data artifacts or signatures that strongly correlate with the existence of a security threat or a network intrusion that should be addressed. Search and database updates associated with Indicators of Compromise are among basic responsibilities of MSSP as well as cybersecurity professionals in IT organizations. MSSP experts continuously check events and logs of IT infrastructure for the traces of known IoC and updates own IoC database.

Threat Analysis | MSS Level

Prioritization of threats has become a necessary measure, as there are too many of them now. We identify the biggest threats and address them first. We turn huge unstructured collection of threats into manageable list that can be realistically addressed to keep your IT infrastructure and data secure. We do it by assessing the risks to operations, reputations and financials of our customer based on the knowledge of what threats are the most targeted by attackers. We manage the most actively exploited vulnerabilities, focus on vulnerabilities that can be used in future and always do it with ultimate attention given to critical assets.

Threat Analysis | MSS Level

When our team discovers the security incident that took place in customer’s IT infrastructure we take necessary steps to understand it and to inform of it. Everything our team finds out exploring the circumstances of security incident and its possible impact, as well as recommended actions to resolve the issue and recover systems or information, is passed to customer’s authorized contacts and security team.

Threat Management | MDR Level

MDR level managed security services include periodical Expert Vulnerability Assessment to discover known vulnerabilities in operating systems, servers, network elements, security systems, DBs etc. of IT infrastructure. There are always chances to find vulnerabilities in product per se or brought about by wrong settings. The customer will be provided with reports detailing results of all tests. Cybersecurity experts will examine the report to find out all risks concerned with vulnerabilities discovered and suggest ways to eliminate risk of security incidents connected with vulnerabilities. Sometimes it will just be necessary to upgrade SW version or amend wrong settings. Sometimes there will be complex cases requiring system changes as simple recommendations will just be insufficient. So, Expert Vulnerability Analysis report will dramatically decrease risk of exploiting vulnerabilities, especially the complex ones which would require system solutions to counteract potential security breaches.

Threat Management | MDR Level

Upon discovery of incident and exploring its root cause and possible impact, we make recommendations for resolution and recovery, communicate them to all parties involved or concerned as well as follow other procedures laid down in customer’s cybersecurity policy. Incidents analysis and communications are made right after identification, with minimal delay possible for high severity incidents and in 24/7 mode (subject to agreement terms). We inform of time and date of incident discovery, generate general description, list of systems and data put at risk, offer measures to be taken and provide other details.

Incident Response | MDR Level

The final and critically important step in responding to a security incident is restoring operation of all systems, confirming their normal status, removing or securing vulnerabilities to protect from similar incidents and business recovery. Our team helps to reconnect networks, rebuild IT systems, restore corrupted or compromised data by, for instance, using clean sources. The process includes changing passwords on compromised accounts, installing new patches, adjusting firewalls settings etc. Then goes a thorough testing of systems and security controls, through penetration tests, for instance. Once integrity of business systems and controls is confirmed, the IT infrastructure will be further monitored with focus on intelligence gathered during the security incident to protect against future attempted attacks.

Dedicated Security Team | MDR Level

When the security incident has been detected in progress it is the right time to start immediate investigation, optimally, in cooperation with customer’s security team. The sooner we discover origin of the attacker, the scope and extent of the attack, time of attack beginning, affected data, potential attacker’s goals, way in to customer’s systems, malicious methodologies used and current progress of attack, the sooner we will know what to do. Timely assessment of attacker’s intents and possible impact of security breach on business operations is the shortest way to minimize incident impact. Online tracking and investigation of incidents is a preferred method of IT infrastructure and data protection, on the other hand it requires a team of several highly qualified security professionals to work together. No wonder, even large Fortune 100 enterprises, not to mention SMBs, prefer to entrust MSSPs with online tracking and investigation of security incidents.

Dedicated Security Team | MDR Level

Today security attacks are quite sophisticated and tricky to protect against. The problem is that any layer of application or infrastructure can get under attack while numbers of exploits, malwares, attack methods seems to grow exponentially. All this makes times difficult even for in-house security teams from global corporations. Yet, your systems, data and business security must and can be achieved.

We constantly gather threat intelligence from various sources of information to enrich our vulnerability scanning and threat detection analytics to differ false from those requiring immediate attention. We know that tools alone will not make our customer’s IT infrastructure and data safe, so our team does its best integrating processes and technologies to deliver actionable incident reports, threat prevention and recovery when necessary.

With Trilight Security you do not have to struggle with global shortage of more than a MILLION of skilled security professionals, as we already have the team to address your needs. We will monitor, analyze, investigate, enrich, escalate, remediate etc. so that you could stay focused on your business.

MSS: Basic or Online

8/5 or 24/7
€49+ per month per one IT infrastructure element. Ask to learn more
  • Scanning and identification of IT infrastructure vulnerabilities
  • Collection, analysis and correlation of events in IT infrastructure
  • Checking for updated IoC base
  • Initial prioritization of threats
  • Informing about security incidents

MDR

Professional
€€ Ask to get monthly rate per one IT infrastructure element
  • Scanning and identification of IT infrastructure vulnerabilities
  • Collection, analysis and correlation of events in IT infrastructure
  • Checking for updated IoC base
  • Initial prioritization of threats
  • Informing about security incidents
  • Expert analysis of vulnerability reports. Suggestion of action points
  • Analysis of incidents and communication with customer's security team (24x7)
  • Minimization or elimination of incident losses

MDR

Enterprise
€€€ Ask to get monthly rate per one IT infrastructure element
  • Scanning and identification of IT infrastructure vulnerabilities
  • Collection, analysis and correlation of events in IT infrastructure
  • Checking for updated IoC base
  • Initial prioritization of threats
  • Informing about security incidents
  • Expert analysis of vulnerability reports. Suggestion of action points
  • Analysis of incidents and communication with customer's security team (24x7)
  • Minimization or elimination of incident losses
  • Online tracking and investigation of incidents with customer's security team (24x7)
  • Dedicated Expert Threat Management