<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">
Skip to content

Cyderes Announces Acquisition of Ipseity Security - Read Full Release 

Managed Services

THREAT HUNTING SERVICE

Cyderes’ Threat Hunting Service helps inform strategic organizational initiatives through recurring threat hunts where active threats and other actionable observations are discovered with recommended remediations, where applicable.

Why Cyderes’ Threat Hunting Service?

Cyderes offers clients the ability to enhance detection and response capabilities as well as free up valuable time of a company’s security resources to perform higher impacting tasks that service organizational business objectives.

Threat Hunting Service Solutions

Initial Setup

Cyderes will work with the client to understand and capture business goals and objectives for their threat management program.

Cyderes will assess current capabilities, including identifying gaps in telemetry, and recommending improvements.

Cyderes will define communication guidelines, escalation paths, and standard reporting, including setting up for MyCyderes access through which all hunt observations are reported.

Management

Resulting observations are reported via the MyCyderes portal via JIRA tickets. 

Any observations indicating major threats are reported directly to the CSM and/or AE to ensure timely communication to the client.

The appropriate squad will also work the ticket as they would any other alert, including escalating to the client when needed.

Reporting and Deliverables

Out-of-band client requests (consultation, etc.) are considered on a case-by-case basis.

Observations will be accompanied by all queries and analytics, and references to any relevant intel.

Recommended remediation actions will only be provided when observations indicate tangible actionable results.

Reports on Recurring Threat Hunts Performed Include:

#1

Identification of gaps in telemetry

#2

Identification of noisy environments and recommendations for tuning opportunities

#3

Identification of misconfiguration and vulnerabilities

#4

Relevant supporting information and recommendations for remediations