CyberPros, LLC

Button
Protecting Your Mission is OUR Mission
Powered by AlienVault
TRUE SECURITY SOLUTIONS REQUIRE THE LEVERAGING OF TECHNOLOGY AND EXPERTISE.
Asset Discovery
› API-powered asset discovery
› Network asset discovery
› Software and services discovery
 
Vulnerability Assessment
› Network vulnerability scanning
› Cloud vulnerability scanning
› Cloud infrastructure assessment
 
Intrusion Detection
› Cloud –, Network –, Host –
› File Integrity Monitoring
 
Behavioral Monitoring
› Asset access logs
› Cloud access and activity logs (Azure Monitor, AWS: CloudTrail, CloudWatch, S3, ELB)
› AWS VPC Flow monitoring
› VMware ESXi access logs
 
SIEM & Log Management
› Event correlation
› Log management, with at least 12 months log retention
› Incident response
› Integrated threat intelligence from the AlienVault Labs Security Team and the AlienVault Open Threat Exchange® (OTX™)
 
USM Anywhere Natively Monitors –
› AWS and Microsoft Azure public clouds
› Virtual on-premises IT on VMware / Hyper-V
› Physical IT infrastructure in your data center
› Other on-premises facilities (e.g., offices, retail stores, etc.)
› Cloud applications like Office 365 and G-Suite








The Digital Overwatch Difference

The CyberPros team are USM Anywhere experts. Our staff of professionals will:
design, configure, and deploy the sensors, log collectors, and storage platforms.
”Tune” the sensors to your specific environment to reduce the noise and false positives.  Install and configure the many third-party “AlienApps” to work with your helpdesk, Incident Response team, or third-party service providers.


24*7 Monitoring of Security Alerts
We provide dedicated and highly trained Security Analysts to perform quick analysis of alerts, alarms, and Threats detected on a 24*7 basis.  Threats are detected, validated and prioritized for action by the Incident Response team
.
 


Incident Response
We provide a dedicated team to perform Full Incident Response activities, including Preparation-Detection-Analysis-Containment-Eradication-Recovery-Post Incident Report (Lessons Learned)
 
 
Penetration Testing
An External Penetration Test mimics the actions of an actual attacker exploiting weaknesses in the network security without the usual dangers. This test examines external IT systems for any weakness that could be used by an external attacker to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organization to address each weakness.
 
  • Network Vulnerability Scanning using multiple commercial and open source tools
  • DNS Analysis & DNS Brute-forcing
  • Port Scanning
  • System Fingerprinting
  • Services Probing
  • Network and File Share Enumeration
  • Password Strength Testing

CyberPros offers ​Digital Overwatch for clients who need a complete cyber security solution. With more than 25 years of expertise as cyber security innovators, we have leveraged USM Anywhere ™ to combine powerful SIEM and log management capabilities with a holistic approach to cyber security.

AlienVault® USM Anywhere™ delivers powerful threat detection, incident response, and compliance management in one unified platform. It combines all the essential security capabilities needed for effective security monitoring across your cloud and on-premises environments: asset discovery, vulnerability assessment, intrusion detection, endpoint detection and response, behavioral monitoring, SIEM log management, and continuous threat intelligence.

USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments, and cloud applications like Office 365. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure. 

Multiple Essential Security Capabilities in a Single SaaS Platform
AlienVault USM Anywhere provides multiple essential security capabilities in a single SaaS solution, giving you everything you need for threat detection, incident response, and compliance management—all in a single pane of glass. With USM Anywhere, you can focus on finding and responding to threats, not managing software. An elastic, cloud-based security solution, USM Anywhere can readily scale to meet your threat detection needs as your IT environment changes and grows.
Copyright © 2016