Introducing ThreatSpike Wire

The fastest growing security platform in the world.

How does it work?

1
You install our application on your workstations and servers.
2
Using our cloud platform, we monitor your network 24/7 for threats and vulnerabilities.
3
We alert you in real time and work with you to secure your network using automated security controls.

What can ThreatSpike detect?

We monitor networks for a broad range of security issues, tailoring our monitoring for the specific industry and requirements of each customer.

Hacking

We monitor for hacking including reconnaissance, network and application exploits as well as lateral movement.

Malware

We use methods including machine learning to detect malicious executables, command and control activity as well as network propagation.

Vulnerabilities

We monitor for weaknesses in technology systems and business processes that may be used to steal data and commit fraud.

Insider Threats

We monitor logins, authorisation changes, access reach, electronic communications and data transfers to detect insider threats.

Protection everywhere

Devices are continuously monitored by our cloud service and protective controls are applied wherever your devices are located, whether that be in the office or on public Wifi.

What features does ThreatSpike provide?

We provide extensive functionality that our customers can use to secure their environments and all functionality is provided as part of a single license.

ThreatSpike delivers deep insight into activity on the network:

  • Metadata is generated for activities such as HTTP requests, file copies and print jobs
  • A built in flight recorder captures every network packet sent and received
  • Packet captures and files can be instantly recalled from devices to assist investigations
  • Metadata is held for one month with the option to extend if required

ThreatSpike can be used to protect against data leakage:

  • Sensitive information is detected in network communications, allowing proactive controls to be applied
  • SSL/TLS inspection allows information pasted into forms and webmail to be detected
  • Granular restrictions can be applied to control the files that can be uploaded to the Internet or USB drives
  • Standing, case-by-case and time bound exceptions can be granted to users who need to upload files

Web browsing can be restricted to ensure compliance with corporate policies.

  • Specific URLs and page classifications can be blocked
  • Restrictions can be applied to Active Directory groups and users
  • Web pages are classified at the device at the point of access, improving performance and accuracy
  • Custom pages can be displayed when pages are blocked

Information about devices is collected and presented through dashboards and reports, including:

  • Location of device and current logged in user
  • Serial number, operating system and version
  • Installed applications and running processes
  • Installed and missing patches

Access to internal systems on the network can be restricted to increase security and mitigate worm propagation.

  • Internal applications can be imported and mapped to specific users and groups requiring access
  • Connections not permitted by policy are stopped, reducing the surface area of the network
  • Automatic sandboxing mitigates the risk of ransomware outbreaks

Start Your Free 14 Day Trial To Experience Next Generation Managed Security.

Free trial

Pricing

We offer the first ever fully transparent, predictable pricing model for a managed security service. We do not rely on 3rd parties and our technology is developed entirely in-house, allowing us to stay agile and avoid passing on unnecessary costs to our customers.

Platinum

£100 / $140

Per Device Per Year

  • Security monitoring
  • Red team / Threat hunting
  • 24/7 incident notifications
  • All features
  • Unlimited reports
  • Unlimited remote support
  • On-site support
  • Prioritised feature requests

Our customers

We provide monitoring services to companies ranging from 10 to 100,000 users spanning 15 industries and 50 countries.

Lee Scott

Cybersecurity and Compliance Manager, Inchcape Shipping Services.

"ThreatSpike offers a strong value proposition that ties in to our business needs. Our experience with ThreatSpike is extremely positive. Like us, it is a dynamic, entrepreneurial organisation and quick to respond to our changing requirements."

Steve Ash

Group IT Director, HSS Hire

"ThreatSpike analysts provide us with assurance that our network and customer data is constantly protected and that when a threat is detected, that it is dealt with quickly."

Our Facts.

ThreatSpike protects customers and devices all across the world each day. With such breadth comes the ability to identify threats as they are arising and develop more capable and accurate algorithms.

20

Average number of issues discovered during trials

2,000

Million events analysed per day

20,000

GB of network traffic analysed per day

FAQ

If you have questions which are not featured here then please drop us an email.

How much time is required to install and manage the solution?

Installation is very quick - all that is required is to deploy an installer to the machines in the network. If a software distribution tool isn't available then we can provide a script to do this. Once deployed, we begin monitoring without any assistance from your team and if we see an issue we raise this with you via email. It is then up to you whether the issue warrants remediation.

Is there a performance impact on the network?

Our software can run in two modes - mirror mode and inline. In mirror mode a copy of the traffic is taken and analysed and there is no impact to the network. In inline mode, which is required for functionality which changes the network traffic (e.g. web filtering, SSL/TLS inspection), there is a reduction in the network bandwidth proportional to the CPU performance, however this is very rarely perceivable by the user.

Where is data stored?

The security of your data is our main concern and we follow industry best practices at all times. Notably we own and manage our own server infrastructure which is hosted in a tier III data center in London and access is highly restricted. We use firewalls to restrict network access, all access to servers is logged, we do not share your data or access to any of our systems with anybody including 3rd parties. We encrypt all data at rest and in transit.

How does this compare with log management?

Log management is complex and also expensive to deploy and manage. Compared to log management which requires taking in feeds from existing products on the network, our technology monitors network traffic directly to build event data which is then correlated within our cloud. It can be deployed very quickly, entirely standalone.

Can this service be used to cover the PCI DSS log monitoring requirements?

Yes, we provide both the technology to collect and generate logs, as well as the day-to-day analysis of those logs by trained security professionals. Usually our customers find that we are able to provide both at a lower cost than our competitors who are offering just a log management product.

Which operating systems are supported?

We support Windows, macOS and Linux. We can also provide hardware sensors capable of monitoring all endpoints on the network.