Managed Cyber Security Services
At Jypra Group, we have made Cyber security simple. Our Managed Security Services offers-365/24/7 security monitoring, threat detection and incident response, risk-based vulnerability and patch management, and more at a fixed monthly price.
Let us assist you with what we do best and protect your business from ever-changing Cyber threat landscape.
Below is the summary of our services
Managed Services
Feature
- 365/24/7 Security Endpoint monitoring
- Malware and Ransomware Protection
- Threat detection, Investigation, Response and Remediation
- Services included in Business Protect and
- Business Email Compromise (BEC) protection
- Email Security and Real-time analysis of links in an email
- Cloud application security (Exchange, SharePoint Online, Microsoft Teams, OneDrive, G-suite)
- Data Loss Prevention
- Services included in Business Protect+ and
- Vulnerability assessments and patch management
- Mobile
- Application Penetration testing
- Mobile Device Security
- SIEM (Security Information and Event Management)
- Security Awareness
- Secure configuration
- Cloud Security and Compliance
- Ransomware assessment
- Security Advisory services
Business Protect
Managed services
Business Protect
- 365/24/7 Security Endpoint monitoring
- Malware and Ransomware Protection
- Threat detection, Investigation, Response and Remediation
Business Protect+
- Services included in Business Protect and
- Business Email Compromise (BEC) protection
- Email Security and Real-time analysis of links in an email
- Cloud application security (Exchange, SharePoint Online, Microsoft Teams, OneDrive, G-suite)
- Data Loss Prevention
Business Complete
- Services included in Business Protect+ and
- Vulnerability assessments and patch management
- Mobile
- Application Penetration testing
- Mobile Device Security
- SIEM (Security Information and Event Management)
- Security Awareness
- Secure configuration
- Cloud Security and Compliance
- Ransomware assessment
- Security Advisory services
Managed services
Cyber Security Services
- 365/24/7 Endpoin Security Monitoring
- Malware and Ransomware Protection
- Threat detection, Investigation, Response and Remediation
- Business Email Compromise Protection
- Email Security and Real-time analysis of links in an email
- Web Security
- Data Loss Prevention
- Vulnerability assessments and patch management
- Mobile Security
- Network Security
- Data Security
- Security Awareness
- Secure configuration / System hardening
- Penetration Testing (Network Only)
- Attack Surface Management
- Security Advisory service
- Managed Cyber Security services and operating environment
Business Protect
Business Protect+
Business Complete
Business Complete+
Business Protect
- Services included in Business Protect are
- 365/24/7 Endpoint Security Monitoring
- Malware and Ransomware Protection
- Threat detection, Investigation, Response and Remediation
Business Protect+
- Services included in Business Protect and
- Business Email Compromise Protection
- Email Security and Real-time analysis of links in an email
- Data Loss Prevention
Business Complete
- Services included in Business Protect+ and
- Web Security
- Vulnerability assessments and patch management
- Mobile Security
- Network Security
- Data Security
- Security Awareness
- Secure configuration / System hardening
- Penetration Testing (Network Only)
- Attack Surface Management
- Security Advisory services
Business Complete+
- Services included in Business Complete and
- Managed Cyber Security services and operating environment
Optional Picks
Web Application Protection pack
- Managed Web Application Firewall
- Web application Code review
- Application Performance Monitoring
- Application Penetration Testing
- Application security / Secure Software Development Lifecycle (SSDLC)
- Security Information and Event Management (SIEM)
- Cloud Security and Compliance (AWS, GCP, Azure)
- High Availability and Disaster Recovery
- Back up (Data)
- Third-Party Risk Management
- * No capped hours on incident response and remediation
- ** Configuration and ongoing Management of the appliance is not included
- *** Configuration and ongoing Management of the IT infrastructure is not included
- **** Up-to 4 hours of Cyber security advisory services is included
- ***** Management of operating environment to reduce the attack surface is included
- ****** Cloud configuration review and advice on remediation is included, however, making configuration changes is not included
- ******* Review of current capability is included
Features
Business Protect
Business Protect+
Business Complete
Business Complete+
- 365/24/7 Endpoint* Security Monitoring
- Malware and Ransomware Protection
- Threat detection, Investigation, Response and Remediation
- Business Email Compromise Protection
- Email Security and Real-time analysis of links in an email
- Data Loss Prevention
- Web Security
- Vulnerability assessments and patch management
- Mobile Security
- Network Security**
manual audit
- Data Security
- Security Awareness
- Secure configuration / System hardening***
- Penetration Testing (Network Only)
- Attack Surface Management
- Security Advisory services****
- Virtual CISO service
- Managed Cyber Security services and operating environment*****
Optional Picks
Web Application Protection pack
- Managed Web Application Firewall
- Web application Code review
- Application Performance Monitoring
- Application Penetration Testing
- Application security / Secure Software Development Lifecycle (SSDLC)
- Security Information and Event Management (SIEM)
- Cloud Security and Compliance (AWS, GCP, Azure) ******
- High Availability and Disaster Recovery******
- Back up (Data)
How we do it
Our 24/7 SOC continuously monitors for threats to your assets. Below is a quick snapshot of our triage process.
Detection
24X7 Alerts Monitoring
Early detection of potential threats and indicators of compromise
Investigation
Threat source identification
Infection chain
Cross-aser analysis
Cross-customer analysis
Cross-partner analysis
IOC assessment
Mitigation
Blocking of suspicious/malicious objects
Quarantine of suspicious emails
Kill/Terminate process
Endpoint isolation
Response
Initial Email Notification
Elimination of False Positives
Incident Report
IOC Assessment Report
Monthly Reports
Policy Assessment Report
Remediation
Endpoint scan & clean up tool deployment
24X7 access to security Analysts
Remediation
- Remediation Assistance
- Endpoint scan & clean up tool deployment
- 24X7 access to security Analysts
Response
- Initial Email Notification
- Elimination of False Positives
- Incident Report
- IOC Assessment Report
- Monthly Reports
- Policy Assessment Report
Business Protect
-
365/24/7 Security Endpoint monitoring
-
Malware and Ransomware Protection
-
Threat detection, Investigation, Response and Remediation
Business Protect+
-
Services included in Business Protect and
-
Business Email Compromise (BEC) protection
-
Email Security and Real-time analysis of links in an email
-
Cloud application security (Exchange, SharePoint Online, Microsoft Teams, OneDrive, G-suite)
-
Data Loss Prevention
-
Data Loss Prevention
Business Complete
-
Services included in Business Protect+ and
-
Servic Vulnerability assessments and patch managementes included in Business Protect+ and
-
Mobile
-
Application Penetration testing
-
Mobile Device Security
-
SIEM (Security Information and Event Management)
-
Security Awareness
-
Secure configuration
-
Cloud Security and Compliance
-
Ransomware assessment
-
Security Advisory services
Advanced
-
365/24/7 Security Endpoint monitoring
-
Malware and Ransomware Protection
-
Threat detection, Investigation, Response and Remediation
-
Services included in Business Protect and
-
Business Email Compromise (BEC) protection
-
Email Security and Real-time analysis of links in an email
-
Cloud application security (Exchange, SharePoint Online, Microsoft Teams, OneDrive, G-suite)
-
Data Loss Prevention
-
Services included in Business Protect+ and
-
Servic Vulnerability assessments and patch managementes included in Business Protect+ and
-
Mobile
-
Application Penetration testing
-
Mobile Device Security
-
SIEM (Security Information and Event Management)
-
Security Awareness
-
Secure configuration
-
Cloud Security and Compliance
-
Ransomware assessment
-
Security Advisory services