Managed Detection and Response

One Platform. One Partner. Complete Security.

How does it work?

What can ThreatSpike detect?

We monitor networks for a broad range of security issues, tailoring our monitoring for the specific industry and requirements of each customer.

What features does ThreatSpike provide?

We provide extensive functionality that our customers can use to secure their environments and all functionality is provided as part of a single license.

ThreatSpike delivers deep insight into activity on the network:

  • Metadata is generated for activities such as HTTP requests, file copies and print jobs
  • A built in flight recorder captures every network packet sent and received
  • Packet captures and files can be instantly recalled from devices to assist investigations
  • Metadata is held for one month with the option to extend if required

ThreatSpike can be used to protect against data leakage:

  • Sensitive information is detected in network communications, allowing proactive controls to be applied
  • SSL/TLS inspection allows information pasted into forms and webmail to be detected
  • Granular restrictions can be applied to control the files that can be uploaded to the Internet or USB drives
  • Standing, case-by-case and time bound exceptions can be granted to users who need to upload files

Web browsing can be restricted to ensure compliance with corporate policies.

  • Specific URLs and page classifications can be blocked
  • Restrictions can be applied to Active Directory groups and users
  • Web pages are classified at the device at the point of access, improving performance and accuracy
  • Custom pages can be displayed when pages are blocked

Information about devices is collected and presented through dashboards and reports, including:

  • Location of device and current logged in user
  • Serial number, operating system and version
  • Installed applications and running processes
  • Installed and missing patches

Access to internal systems on the network can be restricted to increase security and mitigate worm propagation.

  • Internal applications can be imported and mapped to specific users and groups requiring access
  • Connections not permitted by policy are stopped, reducing the surface area of the network
  • Automatic sandboxing mitigates the risk of ransomware outbreaks

Start Your Free 7 Day Trial To Experience Next Generation Managed Security.

Free trial

Pricing

ThreatSpike is the first company to offer a fixed cost pricing model for both defensive and offensive security services.

Our customers

We provide monitoring services to companies ranging from 10 to 100,000 users spanning 15 industries and 50 countries.

Our Facts.

ThreatSpike protects customers and devices all across the world each day. With such breadth comes the ability to identify threats as they are arising and develop more capable and accurate algorithms.

20

Average number of issues discovered during trials

30

Billion events analysed per day

100

TB of network traffic analysed per day