WHAT IS A SECURITY OPERATIONS CENTRE
Networks are constantly under attack and new vulnerabilities are being found by the minute. When these vulnerabilities are found and exposed, the time it may take for you to realise you’ve been hacked could be days or weeks, providing an attacker potentially unrestricted access to your data, communications and financial transactions. Catching these early could be the difference between you staying in business or your business failing.
Curatrix Technologies are able to extend your existing ICT capabilities to provide enhanced security solutions to protect your applications, systems and networks. We deploy advanced, fully managed security solutions that do not require large upfront investments to protect and secure your data infrastructure. Our services are designed to absorb the time-consuming and complex security incident investigation process, offloading the high costs of an in-house security team and ensuring that you can meet strict compliance in all sectors.
Realtime Security Monitoring
Enhanced Network Monitoring
and Remediation against Security Threats
Contact Curatrix Now On 0333 241 2226
What do the Security Operations Centre do?
Continuous Realtime Monitoring
Automated and Human Analysis of network traffic.
Security Event Management
End-to-End Cyber Threat resolutions from discovery to fix.
24/7 Monitoring and Remediation
Working around the clock to keep you protected from threats.
Expert Tuning and Configuration Management
Security specialists monitoring and managing network configurations on your behalf.
Web Application Firewall
Protect your website from being the source of the attack.
Maintain PCI-DSS Compliance on your websites to meet regulations.
Reverse Engineering of Threats
Continuous Monitoring of used Threat Vectors and discovering where weaknesses may exist.
24x7 Support Available
Supporting your Business Crticial Operations out of hours if required.
Ongoing review of configurations and traffic and reporting on potential risks.
Use our Supply Chain to get preferential rates on Laptops, PCs, Servers and More.
WHO WOULD BENEFIT FROM OUR SECURITY OPERATIONS CENTRE?
Our Security Operations Centre would benefit any organisation that has an internal network with sensitive data or eCommerce functionality that takes payment details online.
All Our plans include
12 Month Retention
End to End
FAQ - Your questions, We have the answers!
What is Vanguard-ITSM?
Vanguard-ITSM is the name for Curatrix’s Managed ICT Support services. It is a combination of End User Support, Software Licensing and Device Security. Vanguard ITSM includes Anti-Virus, Patch Management, Remote Access for our Technicians, Sandbox features.
What is Microsoft 365?
Microsoft 365 is an all encompassing Microsoft product that includes:
- Microsoft Office 365 – Word, Excel, PowerPoint, Teams, SharePoint etc…
- Azure Information Protection
- Windows 10 Enteprise (Microsoft 365 E3 and E5 only)
- Many, many security and data auditing features
How many hours support do we get per user?
As many as are required to fix an issue. Our model is based on proactive, not reactive support, we don’t cap how many hours of support your organisation receives per user. Vanguard-ITSM ‘per user’ is an all you can eat buffet of IT Support.
We’ve been advised that we require an expensive server, is this the same with Vanguard-ITSM?
The hardest and easiest question for us to answer. With our service, you do not need a server, we are cloud focused. That said, if you have an ERP solution such as Sage 200 and lots of data transfer, moving this data to the cloud WILL have a noticeable latency affect. We recognise the cloud is not suitable for every application all of the time and we work with you to move unnecessary services offsite, as well as replace On-Premise hardware and support it if required.
Is our bandwidth suitable for your services?
Running a cloud first strategy relies on good bandwidth. If you have 10 users and business broadband, you may ‘get away with it’, however if you have 100 users you’ll likely need dedicated connectivity.
What is Azure Information Protecion?
Think of it simply as a method of protecting your business documents, it applies authorisation levels to access data. Without the required permissions, external parties cannot access the data.
AIP can be applied to any Microsoft document or email. In its simplest form, if you send a spreadsheet with sensitive data in and you only wish for one person outside of your organisation to see it… you have that power.
What is SharePoint?
SharePoint is a Microsoft Cloud based intranet for your company. You can use it as the File Manager, Wiki for your business, document control library…its possibilities are endless. Curatrix provide a ‘top level’ SharePoint as part of all managed contracts. Further development can be carried out for bespoke features.
How quickly can i expect a response to a fault?
In short, all tickets are responded to within 15 minutes of logging, by our helpdesk team. Our standard Service Level Agreement (SLA) is a comprehensive matrix made up of varying priorities, based on the industry standard ITIL catagorisations.
What is Cyber Essentials?
Cyber Essentials is a Government accreditation and guidance on ‘minimum’ security a business should operate to. Cyber Essentials Plus means that a third party auditor has carried out multiple tests that include simulated hacking attempts known as penetration tests as well as the results of those tests. To give you an idea…we have to turn off your security for these companies to even have a shot at scanning your business…BUT, if you have this badge, it means you meet these guidelines and satisfy the base requirements to supply Public Sector and Blue Chip organisations.
Seriously, whats missing?
In short…nothing. We’ve built our support provision as a one stop, all inclusive, under one roof ‘IT bubble’ that you can grow, shrink or pop at your convenience. All we ask is that we have a minimum amount of users to support as the ‘basis for the Contract’.