TRG Managed Security
TRG Managed Security provides a service that includes the tools, technologies and skilled personnel necessary to defend a modern connected business against an increasing volume of threats. By addressing core cyber hygiene practices with network hardening, vulnerability identification and remediation, identity and access management with malware prevention, network monitoring and threat detection and response services, delivers on a comprehensive risk-mitigating Cyber Risk Management service.
By leveraging GravitySM – TRG’s Proprietary ITSM Platform, Security and Network Operations Centre and its tried and tested, best of breed integrated software solutions TRG’s Managed Security is a trusted, holistic and comprehensive answer to ensuring your organisation is adequately prepared for Cyber Incidents.
Service delivery is offered on a Self Managed or Managed Basis.
Prevention and Protection – 7 key pillars of the TRG service framework and what the service provides:
Secure Configuration Management
Secure Configuration Management refers to those products, procedures, features and services necessary for the management and control of your information systems with the goal of enabling security and managing risk which includes Asset , Patch and Policy management.
Identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software is the process of Vulnerability Management. Credential Theft Monitoring continuously monitors Dark and Deepweb sources for any compromised credentials linked to your organisation.
Our team manage your device, provide a monitoring and maintenance program, leveraging the power of GravitySM and its integrated toolsets the TRG team will ensure all devices included are performing as they should, are configured correctly and patched when they should be.
Identity & Access Management
Identity and Access Management provides a single intuitive interface for managing secure, role and access specific password servers, single sign on, multifactor authentication and more.
Threat Detection & Response
Utilising application and device logging platforms for the collection of activity across your organisation’s entire attack surface to detect threats early enough to block and limit any potential damage. Integrating log data from multiple data sources.
Engagement & Education
Training ensures elimination of the biggest cybersecurity threat, reckless and thoughtless employees. We manage Simulated Phishing Campaigns, User Education Training and testing against the learning, reports delivered to management to ensure users are learning.
Endpoint Detection and Response (EDR) couples both the licensing, deployment, monitoring and remediation of your chosen and GravitySM supported EDR solution set. This is not only centralized monitoring and control via your GravitySM console but also full response and remediation services. DNS Protection uses a cloud-based web filtering solution allowing you to monitor, control and protect your users and business when online. Mail Protection is provided, for the blocking of spam, viruses, malware, ransomware and links to malicious websites from your emails. Our platforms identify spoofing and credential theft.