Formed in 2005 as a preferred supplier to UK
Ministry of Defence and Government.
Our long-standing experience means that we can provide each
customer, whatever their size, with pragmatic solutions exactly tailored to suit their specific requirements.
Mobile and highly experienced team consists of senior
professionals who are all passionate about IT security
Managed SIEM & MDR with 24 x7 Automated
response in Teams Automated Response via Teams Monthly External Vulnerability Scanning Information Assurance Policy Library Cyber Security Maturity Assessment Tool
Managed SIEM, SOC & MDR with 24 x7 Threat Hunter response Automated Response via Teams Monthly External Vulnerability Scanning Information Assurance Policy Library Cyber Security Maturity Assessment Tool Annual External Penetration Test & Cyber Risk Management Portal
Managed SIEM, SOC, MDR & XDR with 24 x7 Threat Hunter response Automated Response via Teams Continuous Threat Attacking (Vulnerability Management & Penetration Testing) Automated Compliance updates & reporting Information Assurance Policy Library Cyber Security Maturity Assessment Tool Annual External, Internal and Web App Penetration Test & Cyber Risk Management Portal
The Warrior Networks service was developed with an emphasis on rapid on-boarding, utilizing automation to reduce the need for extensive security personnel and tools. This allows customers to efficiently respond to security events using the most current threat intelligence available. The service is tailored to suit the needs of organizations that already possess a SOC or prefer to handle their own alerts and alarms.
By using the DevOps pipelines this allows our developers to work together on a shared repository of code and as changes are made, there are automated build processes for detecting code issues. The outcome is a faster development life cycle and a lower error rate.
Microsoft 365 and Azure Security activity log data connectors are configured via our Sentinel-as-Code package for automated playbook responses. Automatic responses and collaboration via Microsoft Teams
Our enterprise security system is enhanced by a human touch, which serves to complement our automated processes. Our team of highly skilled Level 3 SOC Analysts carry out comprehensive threat searches, monitoring, reporting, containment and neutralization to ensure the safety of our enterprise.
By utilizing these threat indicators, it is possible to identify malicious activity that may be occurring within customer environments. This information can then be used to provide additional context to security investigators or playbooks, allowing for more informed response decisions to be made.
The Log Analytics agent is employed to gather information from non-standard text file formats originating from both Windows and Linux systems. This information is then transferred to Microsoft Sentinel for analysis and parsing purposes.
By implementing CI/CD deployment, data connectors for various data sources can be seamlessly integrated into the customer's Microsoft Sentinel instance. This ensures that all relevant telemetry is ingested and available for analysis within Microsoft Sentinel.
The service is conducted quarterly, and it centers around agreed assets. Its main objective is to facilitate vulnerability scanning, scheduling, and support the customer in determining the appropriate course of action to respond to vulnerabilities that have been identified.
This service, which is conducted quarterly and only on mutually agreed upon assets, centers around scheduling and conducting vulnerability scans. Additionally, it offers assistance to the customer in determining an appropriate response plan for any vulnerabilities discovered.
Standard log storage spans 1,000 days, providing a long-term solution for forensic investigations. This allows threat hunters to review historical security logs, ensuring data integrity, compliance, and easy retrieval. The logs are stored centrally to guarantee their integrity and ease of access.