Get A Quote
This is the logo of Hitachi Systems Security
24X7 Cyber Threat Detection and Response Services
(BASED ON MICROSOFT'S SECURITY TOOLS) Introducing the service offering of: Hitachi Security Systems Inc.

Agenda

  1. Current Challenges
  2. How Hitachi Security Systems Takes On Your Challenges
  3. Introducing Hitachi Security Systems
    • 3.1 Global Service Offering
  4. Cyber Threat Detection and Response Services with Microsoft Security Tools
    • 4.1 Service Levels
    • 4.2 Service Component Architecture
    • 4.3 Service Level Agreements (SLAs)
    • 4.4 Parameters that influence the level of investment
    • 4.5 Service offering (pricing)

1. Current Challenges

Some current issues encountered in the market:
1. Scarcity of qualified cybersecurity resources
2. Difficulty in covering a 24x7 service with internal employees
3. Lack of cybersecurity expertise in managing Microsoft security environments
4. Complexity of effective ecosystems monitoring (multiple consoles and alerts)
5. Alert triage and incident investigation time
6. Difficulty staying abreast with cyber threats
7. Complexity of creating and maintaining incident response processes
8. Legislation and industry standards are becoming more and more stringent
9. Explosion of the investments necessary to maintain an adequate level of security
10. Difficulty in developing and maintaining cutting-edge cybersecurity expertise in-house

2. We Take On Your Challenges With Our Solutions

1. We take charge of the investigation of alerts and intervention on incidents
2. We ensure sound management of your alerts by reducing your interventions to a minimum
3. Our Security Operations Center (SOC) is on 24x7
4. We have cutting-edge expertise and visibility into customer environments here and internationally
5. Our expertise is available at all times using Microsoft security platforms
6. We help you maximize the use of your Microsoft security solution licenses
7. Better cost forecasting for optimised management of your security budgets
8. Customised and On-Demand cybersecurity and threat intelligence expertise
9. Evaluation of your cybersecurity posture and recommendations for improvement
10. Our frameworks are based on the norms and standards of ISO 27001, NIST CSF, PCI DSS.
11. We free up your time so you can focus on what matters most.
2. Reduced Cybersecurity Costs and Compliance

3.1 Our Story

Through the Years
1999: Funded in Québec under the name of Above Security Inc.
2002: Opening of the 1st SOC in Quebec
2006: Opening of the SOC in Europe
2015: Hitachi Systems, Ltd. acquires Above Security Inc.
2017: Name change to HITACHI SECURITY SYSTEMS Inc. Opening of the (SOC) in Japan.
2022: Hitachi Trusted Cyber Management acquires Hitachi Systems Security
4 SOCs – Security Operations Centers Global 24/7 Monitoring

3.1 Compliance and Certifications

Compliance with International Standards and Certifications

  • Complying to SOC II Type 2
  • Certified ISO 27001 for the delivery of managed security services, Hitachi Systems Security Europe
  • ISO 9001 certified for the delivery of managed security services from the Canadian head office
  • Microsoft Silver Partner
  • PCI Qualified Security Assessor (QSA) for Canada, Latin America and the Caribbean
  • Certifications held by our employees: CISA/M, CISSP, CIPP/C, CDPO SC-200/900, AZ-900, ISO 27001 LA, GCIA/H, CEH, CRISC, OSCP, CGEIT

3. Our Services

We are your strategic partner in cybersecurity solutions and services

24/7 Managed Cyber Security Services
Professional Services
We are an extension of your team

3.1 Service Menu

24/7 Managed Detection and Response(MDR)

24x7 MONITORING OF CYBER THREATS IN REAL TIME | INCIDENT RESPONSE | CYBER THREAT INTELLIGENCE

Professional Services

ASSESS YOUR SECURITY POSTURE | COMPLIANCE WITH NORMS AND STANDARDS | IDENTIFY RISKS
  • Incident escalation in less than an hour
  • Certified Cybersecurity Specialist
  • Sentinel Health Monitoring
  • Customer-specific incident response
  • Vulnerability management
  • Optimization of detection tools
  • Establishment and maintenance of SOPs
  • Monthly reports
  • Managing Microsoft 365 Defender
  • Cybersecurity Posture Assessment
  • Penetration tests and vulnerability analyzes
  • Microsoft 365 configuration review
  • Ransomware Resilience Assessment
  • Digital Forensics
  • Compliance:PCI DSS, NIST, ISO 27001, GDPR, Law 25
  • Cyber ​​Threat Intelligence (DarkWeb, etc)
  • Security Architecture, CISO as a Service
  • Privacy Compliance

3.1 Our Resources

4. Presentation of the MDR service offer

4.1 Presentation of the MDR service offering

General services included in the MDR service offering:
Monitor, investigate and respond to security incidents reported by Microsoft Sentinel.
Recommend best practices and actions to eliminate the recurrence of security incidents.
Helping the customer manage the Microsoft 365 Defender product suite
Propose measures to improve the overall security posture.
Responding to requests and assisting customers with security-related issues.
Establish and maintain SOPs (standard operating procedure) and playbooks to automate and optimise incident response.
Optimise data ingestion to reduce costs by filtering out low value information.
Monitor and adjust the status of analysis rules, data connectors and the Sentinel environment.
Integrate data sources and adjust analysis rules to improve detection capabilities.
10. Difficulty in developing and maintaining cutting-edge cybersecurity expertise in-house

4.1 Presentation of the MDR service offering on Sentinel

4.1 Presentation of the MDR service offering on Sentinel

Architecture of the Managed Detection & Response (MDR) service components

4.3 Service according to severity levels

4.4 Considerations influencing the level of investment

Microsoft 365 Defender Suite covers several aspects (Identities, Endpoints, Apps, Email, Cloud apps, IoT, Azure SQL/Storage, Azure VMs, Azure Containers, Azure Network, Azure App Services) and each aspect represents a separate source.

For example, if Defender for Endpoints and Defender for Identities are two active sources in Microsoft 365 Defender, then this will be counted as two security controls in the cost of the service.
  • Number of users
  • Frequency of service reports
  • Number of years in Agreement
  • Number of service checks (ex. AD=1, FW=1, NDR=1,Linux=1, etc).
  • If vulnerability management: number of IP's to scan and report frequency
  • Licensing of Microsoft tools are the responsibilty of the customer

4.5 Service offering (price) for Client

Marisol Litalien
BAA, CISM
Territory Manager

Hitachi Security Systems Inc.
955 boul. Michele-Bohec, Suite 244,
Blainville (Quebec) J7C 5J6
Canada
T+1 450 434 8060
C+1 514 209 5970


[email protected]
www.hitachi-systems-security.com



Follow us:
LinkedIn | Twitter | Youtube | Blog

4.6 Service set up steps

4.6 RACI Deployment

4.7 Customer requirements to get the service

Technological Prerequisites (licenses)

4.7 Prerequisites of the customer to subscribe to the service

Technology Deployment Prerequisites

4.8 Presentation of the MDR service offer on Sentinel – RACI

4.8 Presentation of the MDR service offer on Sentinel – RACI

Here is an overview of the incident detection and response processing workflow
detection response graph

4.9.Presentation of the MDR service offering on Sentinel – Operational RACI

It's crucial to start today!


Your organization needs cyber threat intelligence services to proactively identify, assess and respond to potential cyber threats and attacks, allowing them to minimize damage and reduce their risk of breach.
Contact Us
phone-handsetcrossmenu