Security Services by wekos

The threat landscape is rapidly evolving. Information security services encompass network, endpoints, vulnerability management, monitoring and analysis. We take on the day-to-day defense of your infrastructure by maximizing your security technology investments through 24x7x365 managed security services.

server cutout

Security Incident & Event Management

Keep an eye on your data

Our skilled cyber-analysts work around the clock to provide manual remediation coupled with artificial intelligence and machine learning from the industry’s most advance aiSIEM, protecting your customers from threats in real-time, including multi-location, hybrid, cloud and third-party access.

How we detect threats

Our platform consumes behavioral analytics generated by an extensive set of dynamic threat models, aided by machine learning techniques to detect both known and unknown zero-day attacks. The platform takes in structured and unstructured data and puts it through a fast parallel processing architecture that allows data to be streamed in through memory in real time. As data streams through the system, thousands of operations are performed in parallel allowing threats to be detected and correlated together, driving analytics within seconds. Ultimately, this very quickly gives us the ability to detect a full range of threats, stop them automatically or with the push of a button and secure against future threats with “self-learning” policy monitoring and enforcement.
  • Raw Network and Metadata StreamCan sniff data directly from network segments
  • NetFlow and SFlowProcesses data from existing Flow collectors
  • SyslogFrom network devices, such as, routers, switches, firewalls and even some servers
  • Windows Active Directory logsUtilizing NXLog to collect Windows AD login attempts
  • Raw Application Logs From applications like MS-SQL, MS Exchange, SMTP, FTP, Office365, DNS/DHCP, File Server, etc.
  • Threat Intelligence and Enrichment DataConsumes feeds from predefined set of threat intelligence sources for enrichment, such as blacklisted URL and domain names.

Security Assesment Services

Vulnerability Scans and Penetration Test

When was the last time you tested your IT security? wekos offers a range of services ranging from point in time Penetration tests to thorough Vulnerability assessments and ongoing scans.

shield

Vulnerability Scan

Vulnerability scanning is the act of identifying potential vulnerabilities in network devices such as firewalls, routers, switches, servers and applications. Typically automated it focuses on finding potential and known vulnerabilities on the network- or application-level. It does not exploit the vulnerabilities. Vulnerability scanners merely identify known vulnerabilities. The output of this type of scan will identify if basic security practices are in effect – satisfying some audit requirements.

Email Phishing 

Hacker use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts.  wekos Email Phishing assessment reports on your organizations vulnerability to this form of attck. 

Penetration Testing

Penetration testing is targeted attack. There is always a human involved requiring the use of specialized tools and time, sometimes a lot of time . It also requires an extremely experienced person to conduct the testing. Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol interfaces (APIs), frontend/backend servers) to uncover vulnerabilities, such as unsanitized inputs that are susceptible to code injection attacks.  wekos assessment report scores which systems were accessed and what method was used during the test. 

Social Engineering

Social engineering is the act of tricking someone into divulging information or taking action, usually through technology. The concept behind social engineering is to take advantage of a potential victim’s human nature and emotional reactions. A social engineer,  could pose as a technical support person to trick an employee into divulging their login credentials. 

shield

Endpoint Security Management

For comprehensive peace of mind

Endpoint Security focuses on protecting enterprise endpoints in a network when accessed through remote devices such as laptops or other wireless devices. A potential entry point for security threats is developed by every single device with a remote connecting to the network. Even if your core network is protected by a Firewall or IDS,  Endpoint Security bolsters your overall protection.

  • Containment with auto-sandboxingAll unrecognized processes and applications are auto-sandboxed to run in a restricted environment.
  • Web URL FilteringAdvanced interface to create rules as required – user-specific, sweeping, or as granular as desired.
  • Endpoint Firewallffers high-level security against inbound and outbound threats, stealths computer's ports, manages network connections, and blocks confidential data transmission by malicious software.
  • AntivirusFeatures multiple technology-based automatic detection, cleansing and quarantining of suspicious files to eliminate malware and viruses.
  • File Lookup ServicesCloud-based instant analysis of unknown files that checks file reputation against our master whitelist and blacklists.
  • Host Intrusion Protection SystemMonitors important operating system activities to ensure protection against malware intrusion.
  • Behavior AnalysisBehavior of all processes are monitored for potential harmful action.
  • 24 x 7 SupportEndpoint Management supported by our 24x7 service delivery center.

wekos Managed Security Solutions