+383 (0) 49 686 668 [email protected]

use case

Managed Security Service Provider

SOC, MDR, and Information Security

Challenge

One of the largest taxpayers in the Republic of Kosovo has a number of companies under rapid expansion. One of the risks identified by third parties was that of the cyberspace. Because their businesses heavily revolve around high-availability IT infrastructure and data mining, it’s very important for them that they are protected from cyber threats. They have been looking to secure the following companies:

 

  • Large Retail Chain of 20+ Markets
  • Consumer Goods Distribution Company
  • Pharmaceutical Company
  • Tobacco Factory & Distribution

 

The aforementioned organization has no Information Security or IT security teams in-house and has been looking for contractors offering Managed Security Services. Specifically, the organization wanted to establish and have a managed Security Operations Center along with Managed Detection and Response. Sentry has been contacted as a potential partner in this regard.

 

Solution

We have worked with the organization to establish a fully functional 18/6 Cyber Security Operations Center with full Managed Detection and Response capabilities. The contract has given us the freedom of choosing a security stack appropriate for the companies that we manage, and as a result we have been able to optimize and synchronize all security products across the infrastructure. In order to provide a full security service, the following technologies have been implemented:

 

  • Carbon Black – NGAV + EDR Platform (Official Partners)
  • Open Threat Exchange (OTX) – Threat Intelligence Platform
  • Splunk – Log Aggregation Infrastructure
  • Sentry Intelligence Gateway – Third Party Management/Monitoring System
  • Labyrinth – Deceptive Technology
  • Backup Shadow Servers – Silent & Stealthy backup services across network nodes
  • Quad9/Cloudflare – Secure DNS Service

 

 

Apart from the SOC and MDR services, Sentry has drafted and implemented the following policies in the organization:

 

  • Information Security Policy
  • Third Party Management Policy
  • Technology Procurement (Security Policy)
  • Disaster Recovery Plan and Policy
  • Onboarding / Offboarding Process
  • GDPR Regulation (ongoing)

 

As part of the MSSP package we have also performed the following service to all of the companies:

 

  • Web Application Penetration Testing
  • Internal / External Network Penetration Testing
  • Social Engineering Testing
  • Endpoint Threat Hunting

Success

We have had our client for more than a year and have had zero high impact incidents regarding business operations. Our security services have ensured that our client can expand with ease knowing that all of their cyber fronts are covered. As a result we have been referred to other companies for our managed security services. The cost and talent acquirement through our training programs has allowed us to scale quickly and offer competitive prices in the market utilizing some of the most advanced technology stacks in the field.

 

How We Took Over ‘Hack The Box’

Hack The Box https://www.hackthebox.eu/ is one of the most popular platforms when it comes to CTFs, boasting almost 150,000 Ethical Hackers. This is by far one of the largest online hacking communities with a fantastic competitive aspect to it. Sentry Cybersecurity...

Top 2018 Cyber Threats and Prevention Tip

Cybercriminals are constantly modifying and evolving their strategies and tools to steal and compromise data all over the world. Nobody knows what the next attack could be, but in order to keep up, people need to take actions to try and prevent any unwanted data...

Cyber Defense Week 2018

Cyber Security jobs are growing three times faster than information technology jobs. However, this rapidly growing and very exciting industry lacks the number of skilled professionals required to handle the jobs. Cyber Defense Week is a one-week event that is...

Google+ Shutting Down After Exposing 500,000 User’s Data

The tech-giant suffered a massive data breach, exposing the private data of hundreds of thousands of Google+ users to third party developers. According to Google, a security vulnerability in one of Google+'s People APIs enabled third-party developers to access data...

Copyright 2019 Sentry
All Rights Reserved.

Website and Visuals by Mayune
Contact

+383 (0) 49 686 668
[email protected]