MANAGED DETECTION
AND RESPONSE

ACCELERATE YOUR DEFENSE

Combining cutting edge technologies with expert human analysis to monitor, hunt, and take rapid response against threats that slip past the prevention layer.

Fully Managed 24/7 Monitoring

Threat Hunting

Malware Analysis

Affordable Pricing

Monthly Reports

DISCOVER THE POWER OF RESPONSE.

SEE OUR LIVE DETAINMENT >>>

WHAT Blackpoint's MANAged detection and response Service provides

Our Managed Detection and Response service leverages both technology and expert human analysis to detect known and unknown threats with the capability to respond. When an incident is detected, our MDR team will be standing by to respond immediately based on your organization's predefined action agreement.

Real-time threat detection

Real-time Threat Detection

24/7 monitoring by our security analysts and threat hunting team to discover any
cyber threats that may have slipped passed your prevention layer.

expert human analysis

Human Analysis​

In combination with cutting-edge technology, a team of qualified security operations center (SOC)
personnel investigate the origin and scope of attack.

Managed Detection and Response (MDR) Real-time Response

Incident Response​

When a threat is detected and confirmed to be malicious, our MDR team has
the ability to detain the infected device immediately.

Managed Detection and Response (MDR) Gartner

"IT security leaders should use managed detection and response (MDR) services to augment existing security monitoring capabilities to address gaps in advanced threat detection and incident response before investing in more security monitoring tools (e.g., security information and event management [SIEM], network, and host-threat detection), and associated staff and expertise."

Gartner, "Market Guide for Managed Detection and Response (MDR) Services", May 2016, Bussa. Lawson, Kavanagh

Managed Detection and Response (MDR) by Blackpoint

Affordable
Monthly
Pricing

MDR Service Includes:

 | Active threat Hunting | 24/7/365 Coverage
Attack Surface Vulnerability Assessment | Monthly Reports

Features:

  • Patented Lateral Spread Detection
  • Enumeration Detection
  • Real-time Alerts
  • Real-time Response
  • Privileged User & Activity Monitoring
  • Insider Threat Monitoring
  • Live Network Map
  • Historical & Real-time Reports
  • Compliance Module

3rd Party Integrations:

Tenable MDR integration
ConnectWise MDR integration
Juniper MDR integration
Webroot MDR integration
...and more!

Additional MDR add-ons:

+ Anti-Virus

  • Anti-malware
  • Pre-execution Behavior Analysis
  • Web Security
  • Download Reputation

+ Advanced Endpoint

  • Deep Learning Anti-malware
  • Ransomware File Protection
  • Man-in-the-browser Protection
  • Disk & Boot Record Protection
  • Credential Theft Protection
  • Process Privilege Escalation
  • Malicious Process Migration
  • Asynchronous Procedure Calls Protection

+ Network Monitoring/Threat Detection: NICOS

  • Asset Discovery and Visibility
  • Port Scanning Detection
  • Obfuscated (TOR) Traffic
    Detection
  • Malicious Domain
  • Remote Access Monitoring
    (SSH, RDP, VNC, etc.)
  • Custom Rulesets
  • Threat Intelligence Feeds
Blackpoint NICOS for IoT

A SERVICE FOCUSED ON
ADVANCED Cyber THREATS

Blackpoint's dedicated Security Operations Center (SOC) team members don't just focus on detecting known threats - they also analyze, hunt, and research evolving threats so they can always stay a step ahead of hackers.

Lateral Spread Tradecraft

Ransomware/Malware

Infrastructure Enumeration

Privileged Users and Activity​

Asset Visibility and Remote Access

Insider Threats​

How MDR works

Step 1.

You deploy our agent using your remote management software to builds a live network map of your IT infrastructure for our security analysts.

Step 2.

We monitor, assess, and study your network environment and work with you on addressing any discovered security vulnerabilities or general network hygiene tips.

Step 3.

Our 24/7 SOC analysts monitor and respond to any threats for you based on your preferences. Email, SMS, Phone, etc.

Step 4.

Relax knowing we're watching - think of us as your team of virtual cyber experts playing defense for your organizations reputation, network assets, and customer data.

Deployment Made Simple.

We understand that you don't have time to learn yet another tool. That's why we've made the process of deploying our managed detection and response service as quick and painless as possible. Our lightweight agent deploys in minutes using your existing Remote Management Software.

remote deployment

Quick and Easy setup

ONE SHEET: AFFORDABLE MANAGED DETECTION AND RESPONSE

Copyright © 2019 Blackpoint Cyber