Twyla Technology Managed Security Services are segregated into three main categories:
- Security Monitoring
- Incident Response
- Threat Intelligence
Each of these categories has a list of underlying services that would help protect the customer from major vulnerabilities and threats.
Twyla Technology provides 24/7 monitoring of customer infrastructure and has visibility into various security aspects. Security monitoring is done real time and threats and vulnerabilities are tackled in the same manner. Our SOC analysts take proactive approach in mitigating customer environments against the latest threats. Monitoring also includes alerts for the customer for various criticality levels and delivers complete visibility into their system.
Security monitoring includes:
- Host monitoring
- Network monitoring
- Application-log monitoring
- Data-in-motion monitoring
- Infrastructure log monitoring
User account authentication and access monitoring
Twyla Technology ensures that in case of any incident, proper SOPs are followed based on the predetermined criticality factor of the incident.
Twyla Technology follows a standard procedure to ensure that any breach or threat is timely dealt with and its impact is mitigated. Following is a general SOP followed by Twyla Technology SOC team to handle any incident:
Following are further services delivered as a part Twyla Technology Managed Security Services.
- Incident scope and severity determination
- Computer forensics
- Major breach support
- Static and dynamic malware analysis