PROMOTION MICROSOFT OFFER
How Microsoft Sentinel can help M365 E5, A5, F5, and G5 customers |
Contact us for pricing. Funding and offers available for qualified buyers |
Endpoints Endpoints include any device that has EDR software installed on them. This can be Laptops, PC’s, Servers, and mobile devices. |
|
|
|
Identity and Behavior Identity and behavior includes cloud-based identity providers such as Azure Active Directory, on-premises identity logs from Active Directory, and user and entity behavior analytics provided by identity systems and BDO Digital MDR. |
|
|
|
Firewalls Log data from physical or virtual firewalls are ingested into BDO MDR and correlated against third party threat intelligence feeds and client log data to identify potential events of interest. |
|
|
|
On Premises Infrastructure On-premises infrastructure can include routers, switches, wireless controllers, network access controllers, hypervisors, load balancers, and other devices that support syslog. |
|
|
|
IoT/OT Security event logs from IoT/OT environments to detect and alert regarding malicious activity in critical infrastructure environments. |
|
|
|
3rd party data sources (e.g., SAS, Cloud) Third party services can include cloud providers such as AWS or GCP. It can also include SaaS applications or 3rd party security tools. |
|
|
|
Managed SOC Monitoring and investigation by experienced security analysts providing a detailed alert analysis and taking steps to contain intrusions to protect environments. |
|
|
|
Dedicated Service Delivery Lead Liaison and primary single point of contact (SPOC) for overall delivery of managed services. |
|
|
|
Automated Threat Hunting Utilizing Microsoft Sentinels advanced toolset defenders create queries to detect anomalous activity. BDO defenders review the results to find unseen threats. |
|
|
|
Data Loss Prevention Monitoring Ingestion of telemetry from data loss prevention systems to alert on potential sensitive data exfiltration. |
|
|
|
Insider Risk Ingestion of insider risk to detect and alert on behaviors such as confidentiality violations, IP theft, fraud, insider trading, and regulatory compliance violations. |
|
|
|
Reporting Dashboard Realtime ticketing dashboard with trending data for incident type, severity and status. |
|
|
|
Reporting & Advisory Dedicated security architect including monthly reports, recommendations, and cyber roadmap advisory. |
|
|
|
Incident Management BDO Digital uses widely practiced methods of reviewing alert data to determine the risk and likelihood of intrusion. BDO Digital is dedicated to altering, containing, and working with your organization to eradicate the threat within the environment. |
|
|
|
Additional Standalone or Sentinel Integration Add-ons (contact for pricing) |
Cyber Threat Intelligence |
Vulnerability Management |
Dedicated Security Architect |
Advanced Threat Hunting |
Alert Validation |
Simulated Attacks |