Mitigate Services

  • Security assessments
  • Log collection and log retention
  • Analysis of logs
  • Alerting via:
    • SMS,
    • Email,
    • Direct call 24 x 7 x 365.
  • Remediation via on-site Resolver teams (or your dedicated staff)
  • On-site dashboard availability showing a variety of information including:
    • Overviews,
    • Security,
    • Business Intelligence,
    • Transactions,
    • Operational,
    • Just about anything else.
  • Monthly reporting
  • All these Services are provided 24 x 7 x 365

Monitoring

  • User Directories:
    • Compliance: Provide compliance dashboards based on what is relevant to your organization. Examples of these include privileged users, accounts created, accounts deleted, accounts disabled, escalation of privileges, password resets.
    • Security: Provide security dashboards showing a variety of security indicators.
  • Security infrastructure:
    • Dashboards: Provide security dashboards showing views customized to meet your requirements.
    • Integrated Threat Feeds: Mitigate uses a variety of threat feeds which quickly highlight indicators of compromise within your network.
    • Trend analysis: patterns are analysed for anomalies to quickly diagnose deviations from normal operations.
  • Crown Jewel: Financial system, ERP or any other Business Critical system
    • Since every business has different systems and requirements specific details of this can only be determined during an engagement with you. Examples of what we can monitor include attempted logins, privilege escalation, etc.

Active Security

  • Network Intrusion Detection System (IDS):
    • Our system provides a number of high-criticality identifiers that will feed into the security dashboards. It is not a replacement for your existing IPS / IDS devices.
  • Honeypot Sensor:
    • Strategically placed sensors provide indicators of possible perpetrators already acting inside your network.
  • Vulnerability Scanner:
    • This will complement your patch management solution by highlighting all missing patches, default configurations and other vulnerabilities within your environment.
  • Fraud detection and Risk Management:
    • Mitigate have a variety of specialized tools at their disposal to assist in identifying, recording and combatting the ‘insider’ threat.