Nuspire’s Cyber Threat Monitoring

Additional Info

CompanyNuspire Networks
Websitehttp://www.nuspire.com
Company size (employees)105
Type of solutionService

Overview

Nuspire’s Cyber Threat Monitoring (CTM) utilizes Nuspire’s own SOC II certified Security Operations Centers (SOCs), which are staffed 24/7/365 to assist customers with network management, security monitoring, and support. Security engineers are on-call to provide advanced technical assistance, network management and security monitoring services, with mastery of the tools necessary to ensure network reliability and efficiency.

Nuspire’s security analysts and engineers use world class tools to discover potential issues before they impact network performance and reliability. Through trax™, Nuspire’s proprietary network management, monitoring, security, and ticketing solution, a Nuspire engineer can alert clients of potential problems instantly and provide immediate remediation or mitigation consultation to protect the client’s network.

At the heart of Nuspire’s Managed Security Service is nuSIEM – a proprietary Cloud SIEM which is a fault-tolerant, extremely fast, clustered parallel data execution engine SIEM with advanced machine learning and heuristics, built for utilizing the Nuspire’s big data of billions of logs processed per day. Security research through Nuspire’s Security Analytics Team (SAT) and NuSecure Labs R&D and development teams, produce enhancements to nuSIEM and Advanced Threat Intelligence used by a Tier system of engineers.

This comprehensive security monitoring is combined with advanced Technical, Tactical, Operational and Strategic Cyber Threat Intelligence. Nuspire’s Security Analytics Team (SAT) utilizes these components for normalization, correlation and aggregation of threats. Once combined and ranked according to proprietary techniques, Nuspire is able to utilize their big data infrastructure to provide real-time analytics and alerts as part of the Cyber Threat Monitoring service. The result is a service level agreement that takes responsibility for security monitoring and response activities.

How we are different

-World-class SOC II compliant Security Operations Centers (SOCs)
-World class tools to discover potential issues before they impact network performance and reliability
-Service Level Agreements for security monitoring, response, and remediation activities.