We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
CR KYOCERA
Managed Endpoint
Detection and
Response (M-EDR).
Para ete ‘tects against ransomware, zero-day malware,
leless attacks, phishing and more.
kyocera-annodata.co.ukManaged Endpoint Detection
and Response (M-EDR).
oS
Ensure your business has comprehensive protection.
Now and for the future.
(Our Managed Endpoint Detection and Response solutions protect businesses of all sizes
from all current and future cyber threats. A fully managed cyber security service, it ensures
that your IT teams are free fo focus on more strategic business goals
The best-in-class Endpoint Detection and Response solutions are fully managed, delivering @
human overlay to technology-based, automated detection, analysis and response software.
(ur team monitors and manages system configuration, policies and alerting provided to
the security operations teams. The solution also provides 24x7 proactive threat detection
capability and enables the Kyocera teams to provide analysis and response (remediation)
activities.
Industry analysts review security information provided by the managed endpoints and other
monitored systems within the customer environment. Mulliple threat intelligence feeds to
Quickly respond and remediate at the root cause.
What is an endpoint?
network.
Personal
Devices
lot devices
Now, youre probably thinking of laptops, phones and sensors
and PCS, right? However, even your company fridge
and microwave could be an endpoint and posing yet
‘another threat gateway fo your business. By
Desktops
youiretoking care of business. 2Managed Endpoint Detection
and Response solutions.
(Our M-EDR solution provides a comprehensive set of service packages that leverage the
component features of leading technology platforms fo perform prevention, detection, and
response for all endpoints, enabling remediation of malicious threats or anomalous activities
within the customer environment.
Visual.
‘The base option behind this solution, which we call ‘Visual, includes the following service
features:
+ Onboarding + Optional tuning and configuration
+ Automated technology-based detection and analysis + Health, status, and availability systems management
+ Proactive threat hunting using the security platform
+ 24x7 Managed Detection and Response + Root cause analysis, process containment, and
+ Application of industry-leading cyber threat intelligence remediation
for threat detection + Service reviews, threat insights and cyber security
+ An experienced and professional security operations recommendations.
team
Each subsequent solution builds on this base level, leading fo the pinnacle of cyber security.
Well take care of security while you're taking care of business. 3Why Managed Endpoint
Detection and Response?
We align with leading cyber security best practices and
frameworks to ensure we deliver a portfolio
of services that meet the ever-changing threat
landscape.
NIST Cyber Security Framework is one the most well-known
frameworks and follows the five functions/pillars of the cyber security
program,
We ali st these defined pillars tc Ni
fe align our services against these defined pillars fo ensure maximum ver
protection and referenced architecture. OSogomerelComers”
(Our solutions provide insights into areas of the ICT landscape that
are vulnerable and not protected while providing tailored services to
maximise existing resources and skil sets
‘The fundamental philosophy behind our services i to prevent, before
the need to respond and remediate. Through our insight reports anc
customer success journeys, we work with customers to improve their
‘overall cyber security postion with a view to preventing or
reducing treats.
The key benefits of Managed Endpoint Detection and Response:
Reduced complexity. Maximum security.
The burden of threal-hunting is faken away _Behaviour-based protection and proactive
from the end user and a root cause analysis response fools fo safeguard your system,
of any attack is provided so businesses allowing the cyber security team to address
understand why cyber criminals afacked the root cause of the issue, kill or quarantine
and how to prevent a recurrence. the threat, and remediate or roll back the
system as needed
Stay ahead. Better protection.
New software security threats emerge daily, Protect against all types of attacks, from
putting your data at risk...Get ahead of any commodity malware fo ransomware and
new threats and stop attacks before the other sophisticated attacks. All from one
breach fo save on recovery costs and a loss _ solution that prevents silent fail
of reputation,
Yyouitetoking care of business.Our solutions are built on the
following NIST Cyber Security
Framework foundations.
Identify.
The identity process sets out fo baseline and set the core
configuration of the environment. This is often built during
the onboarding phase and tweaked as the system and feam
learn the Identify steps that represent an important step in
the protection of systems. The customer can feed into the
Identify phase during onboarding, questionnaires, and
service operating model steps.
Protect.
The Protect process lays down the control layer of the
protection, it sets the controls in which the system pulls,
from the policies defined in the Identify phase. Looking at
vulnerabilities and active threat hunting the phase is critical
to the prevent element of overall protection.
Detect.
Using the insights from Protect coupled with the rules,
policies and understanding developed in Identify, our
‘advanced security analysts can detect a wide range of
attacks in your environment. Focusing on Indicators of
Attack that may involve memory injections, executables, file
changes, and registry modifications or malicious/unusual
actions as well as traditional signatures and hashes, we have
unparalleled detection capability
Respond.
‘On potential signs of compromise, M-EDR utilises EDR at
the endpoint to move or otherwise isolate questionable
activities. M-EDR service ulilises several techniques should a
detection occur, depending on the severity and type:
Kill a process
Shutdown, restart endpoint
kill network connections
Reverse shell on endpoint
Download files to endpoint (exe, patch, etc)
Upload logs from endpoint
Run a script or PowerShell
Ban a process
‘Quarantine files
Contain endpoint
Recover.
Asa part of the Recover activities our analysts can provide
detail of the incident including IOA, points of entry,
activities and compromised systems and files. Should a
recovery of a system be required, we can provide (subject
to your package) a dedicated security analyst that will talk
you through best practices for recovering workloads and/or
endpoints.
The detail of any recovery is subject fo the type of attack
and therefore it is not possible to define this element in
detail. However Kyocera team will work with the customer
{0 provide as much information as possible to deliver an
‘outcome whereby the customer may recover the
affected hosts/endpoints.Why do you need Endpoint
Detection and Response?
The evolving threat and sheer volume of security alerts mean it can
be hard for IT teams to keep up particularly when using legacy anti
virus technology which is reliant on exi ig knowledge of threats and
relevant definition file. This can put critical business operations at risk
and potentially cause irreparable damage.
Finding the right skills, and retaining experienced cyber security professionals has become
‘a major obstacle for businesses of all sizes; especially when a 24/7 security resource is
needed,
‘Whereas antivirus only provides detection and response fo malware on an infected endpoint
using a variety of different techniques, EDR incorporates Next Generation AnfiVirus and,
‘other endpoint security functionality. This provides full protection against a wider range of
potential threats via Al learning in the cloud.Have you got full visibility?
Or are you vulnerable?
Imagine you're a CEO, chances are that you're aware of the increasing
number of cyber incidents in recent years, but they always seem a
little far from home, they would never happen to you, right?
‘One Friday afternoon, just after lunch one of your employees clicks the link on the
innocuous-looking link on an email they received, apparently from a legitimate source
They/ve just fallen victim to a classic phishing email and just lke that, from an employee's
action on a single endpoint, your entire network is infected with ransomware.
You're now given 48 hours to pay the ransom in order to gain access fo your newly
‘encrypted files. The problem is is already Friday afternoon and the technical support team
for your Endpoint Detection and Response system has clocked off for the weekend.
By Monday morning the ransom has been paid, but they've siill not released the encryption
key for your files. Now not only have you paid the ransom and incurred a significant
financial loss, but you'e also losing fime, only adding to the fotal losses associated with,
clicking a link on a single email.
Now imagine an alternative scenario where you're using one of our Managed Endpoint
Detection and Response solutions... Our team of experts are on hand fo provide assistance,
‘even though itis late on a Friday afternoon (they/re available 24/7 in case you were
wondering).
Rather than the threat going undetected and the ransomware gaining access fo your
systems, our software automatically detects the malicious intent, either killing or
quarantining it
You are now able fo roll back or remediate the system as needed, ensuring no damage is
caused. Then you will be sent a detailed report, providing insight info how and why the
attack occurred, allowing you to understand the reasons behind it and educate your team
accordingly.
In this scenario, you are now free fo enjoy your weekend in peace!
Well take care of security while you're taking care of business.Kyocera Document Solutions has championed innovative technology
since 1959. We enable our customers to turn information into
knowledge, excel at learning and surpass others. With professional
expertise and a culture of empathetic partnership, we help
organisations put knowledge to work to drive change.
Eldon Court
75-77 London Rood
Reading
Berkshire RGI SBS
Tol: 03330 151855
e: [email protected]
kyoceradocumentsolutions.co.uk
CR KYOCERA
A Kyocera Group UK Company
Annodate Ltd.
The Maylands Building, Maylands Avenue
Hemel Hempstead
Hertfordshire HP2 71G
Tol: 03330 151856
@: [email protected]
kyocera-annodate.co.uk
carbon
< Me,
gy 2
= z
% =
é
e