IT Security Coordinator at a healthcare company with 10,001+ employees
Real User
2020-07-23T12:17:23Z
Jul 23, 2020
There could be multiple answers to your question based on how your environment is set up. You have edge defense (firewalls, IDS, IPS like ngfw palos and fidelis), you have endpoint like av or edr (sentinel 1 or symantec or carbon black etc). There are also various other tools out there that are apt or malware finders and ones that look at log sources..then on tracking incidents you have the servicenow /remedy side..
Search for a product comparison in IT Alerting and Incident Management
Incident Response Plan or Workflow
Incident Classification and Prioritisation book
The right People Process and Technology
The Playbook
Efficient SOC strategy
As the appropriate policy may vary depending on the country, business size and sector, please contact me directly at cybersec@global.co.za to provide me with your country, time zone and Skype and/or WhatsApp contact details and I’ll be happy to discuss the subject.
Security Incident Response enables organizations to efficiently manage cyber threats, reducing downtime and potential damage. It involves preparation, detection, analysis, containment, eradication, and recovery from security incidents.Efficient Security Incident Response is crucial for maintaining business integrity by addressing unexpected security breaches promptly. It involves coordinated strategies to identify and mitigate threats, ensuring that risks are controlled and lessons are...
There could be multiple answers to your question based on how your environment is set up. You have edge defense (firewalls, IDS, IPS like ngfw palos and fidelis), you have endpoint like av or edr (sentinel 1 or symantec or carbon black etc). There are also various other tools out there that are apt or malware finders and ones that look at log sources..then on tracking incidents you have the servicenow /remedy side..
Incident Response Plan or Workflow
Incident Classification and Prioritisation book
The right People Process and Technology
The Playbook
Efficient SOC strategy
As the appropriate policy may vary depending on the country, business size and sector, please contact me directly at cybersec@global.co.za to provide me with your country, time zone and Skype and/or WhatsApp contact details and I’ll be happy to discuss the subject.