Background Image

Sentinel Detection

Do not let anything get away.

Stay sharp. Protect your organization by keeping an eye on the activity surrounding it, both inside and outside the premises.

Discover

Your organization’s blind spots.

Spot

Confidential information leak agents and vectors.

Respond

To potential incidents in a timely and efficient fashion.

Sentinel detection


Right between defense and offense lies observation. No security plan can be properly executed without including strong detection procedures.

The correct combination of monitoring solutions can prepare your organization for any type of attack, whether it is to prevent them from happening or to ensure that your organization is empowered to face a potential incident and resolve it in the simplest and quickest way possible.

Screenshot

SOC

A SOC main task is to monitor every active (servers, networks, perimeter, sites and Web applications) 24/7/365 to detect as early as possible the potential threats and attacks towards them, and offer a rapid response that mitigates to a maximum the risk.

Our 24/7 SOC provides protection on all essential layers of the OSI model, integrating a set of solutions built exclusively by Mkit, providing an extra ring of coverage. That way, we can take care of the network as well as the applications and overall perimeter status.

Screenshot

CSIRT

A CSIRT is a team formed by a multidisciplinary team of professionals (security, infrastructure, development, legal, PR). This team performs response procedures before IT incidents allowing to mitigate the damages of the incidents towards acceptable levels.


Said procedures involve the early response to the incident, the quick recollection of the elements that can help identifying the source cause and the public communication of the contingency, followed by the corrective actions taken by the team.

Currently, Mkit leads one of the few private global reach CSIRTs, having made alliances with many FIRST team members and improving its reach to both public and private entities.

Screenshot

RISK MONITORING

Continuous analysis of the organization digital ecosystem in multiple scenarios for information exchange, allowing thus the anticipation of an incident that may negatively affect its reputation, and assisting in any potential investigation.

  • Search engines
  • Social media
  • Press
  • Classification lists
  • Online discussion forums
  • Internet infrastructure (Stand-alone systems, routing protocols, etc.)
  • Incidents and vulnerabilities databases
  • Phishing campaigns using the client as a vector
    • Impersonate the organization and its employees
    • Phishing attacks detection to the organization’s name by a third


WE OFFER

Immediate identification of potential risks

Quick attack response and prevention of their expansion

Resilient incident recovery

Auditing processes and strategic planification efficiency increase

Increase of awareness in the work group

Organization integrity and image protection


THE MKIT SIGNATURE

  • Human factor
    • Governmental experience
    • 3 language service (English, Spanish, Portuguese)
    • Physical availability in 3 countries
    • Active watch duty 24/7/365
  • Technological factor
    • Original, unique and integrated developments with market solutions
    • Network and application protection coverage
    • Private and reserved operative environment, adaptable to any scenario
    • Strategic analysis with Software/Hardware/Services Retailers
Sentinel Detection

FAQ

  • Can any company hire the CSIRT service?

    Yes. The necessity of a CSIRT service is not limited to big corporations. Any kind of organization that is publicly exposed (or handles sensitive information) should have an incidents response team to manage in an orderly fashion the potential eventualities that might affect it negatively.
  • My organization does not function 24/7, is a 24/7 SOC necessary?

    Yes. The protection of a 24/7 coverage SOC is essential to keep the appropriate ease of the organization assets at all times, even when it is not operational. Attackers never sleep, so protection shall not either.
  • What is the best course of action after an incident?

    The best way to retort an eventuality is with calm and order. The communication inside the incident report team is vital, the same goes for the continuous chronological facts documentation that may happen during an incident.

    Arbitrary or sudden measures should not be taken. It is best to plan a response strategy and act objectively, to ensure the correct monitoring of the case and increase the response and resolution capacity.

A solid surveillance strategy is crucial. Sometimes, the smallest risk can become the greatest threat because of a failing monitoring solution. Gain control of the situation by staying ahead of the problem.

Breached?