SUPPORT HOTLINE 855.666.6709
Phalanx Secure Solutions provides around the-clock monitoring and management of security technologies housed in an organization’s IT environment or in Phalanx Secure Solutions data center. Through a single management console, Phalanx Secure Solutions security analysts can view your entire security infrastructure.
24/7/365 SECURITY OPERATION CENTER MONITORING
The state-of-the-art Security Operations Center provides round-the-clock coverage using severity based alerting from our correlation analysis engines. SOC analysts, are always “At the Ready” and watching your system to look for bad actors, malware, intrusions, and other security threats.
PHALANX RESPONSE RETAINER
During the middle of a security breach is not the time to worry about billing and purchasing hours. The Phalanx Response Retainer allows Phalanx to immediately begin servicing your account based on a pre-determined set of rules of engagement.
The SOC analysts are trained to respond to incidents ranging from ransomware infections to Denial of Service attacks. SOC analysts also assist your IT department as they are usually the first line of defense. Coverages vary and are based on the service level agreement in place. In the event of a breach, a team will be on site as soon as possible and stay until the problem is resolved.
SOC analysts are trained on a variety of firewalls and use the highest standards to ensure a limited threat vector from insider threats and external attackers. Firewalls can also have their syslog forwarded for collection for additional monitoring capabilities.
INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) MANAGEMENT
SOC analysts are able to deploy sensors to remote locations throughout the world and can deploy an intrusion detection system within a day. If desired, this IDS can be transformed to be an intrusion prevention system. Through custom rules and alerting, SOC analysts are able to ensure the greatest protection available.
SECURITY INTELLIGENCE ANALYST
Security Intelligence Analysts synthesize data from various threat vectors such as behavioral analytics to packet captures to log analysis to ensure a full picture is available when labeling a threat as a breach. Security intelligence is intended to limit the amount of false positives and false negatives to ensure solid decision making.