Interested in getting a quote? Contact us today and find out how our professional cybersecurity services can help you protect your business, strengthen your security posture and meet compliance requirements
Hitachi Systems Security’s mission is to make the Internet a safer place
for all, to harness the full potential of connecting people and businesses together to build trusting relationships that can be the catalyst of worry-free collaboration and limitless innovation.
(BASED ON MICROSOFT'S SECURITY TOOLS)
Introducing the service offering of: Hitachi Security Systems Inc.
Agenda
Current Challenges
How Hitachi Security Systems Takes On Your Challenges
Introducing Hitachi Security Systems
3.1 Global Service Offering
Cyber Threat Detection and Response Services with Microsoft Security Tools
4.1 Service Levels
4.2 Service Component Architecture
4.3 Service Level Agreements (SLAs)
4.4 Parameters that influence the level of investment
4.5 Service offering (pricing)
1. Current Challenges
Some current issues encountered in the market:
1. Scarcity of qualified cybersecurity resources
2. Difficulty in covering a 24x7 service with internal employees
3. Lack of cybersecurity expertise in managing Microsoft security environments
4. Complexity of effective ecosystems monitoring (multiple consoles and alerts)
5. Alert triage and incident investigation time
6. Difficulty staying abreast with cyber threats
7. Complexity of creating and maintaining incident response processes
8. Legislation and industry standards are becoming more and more stringent
9. Explosion of the investments necessary to maintain an adequate level of security
10. Difficulty in developing and maintaining cutting-edge cybersecurity expertise in-house
2. We Take On Your ChallengesWith Our Solutions
1. We take charge of the investigation of alerts and intervention on incidents
2. We ensure sound management of your alerts by reducing your interventions to a minimum
3. Our Security Operations Center (SOC) is on 24x7
4. We have cutting-edge expertise and visibility into customer environments here and internationally
5. Our expertise is available at all times using Microsoft security platforms
6. We help you maximize the use of your Microsoft security solution licenses
7. Better cost forecasting for optimised management of your security budgets
8. Customised and On-Demand cybersecurity and threat intelligence expertise
9. Evaluation of your cybersecurity posture and recommendations for improvement
10. Our frameworks are based on the norms and standards of ISO 27001, NIST CSF, PCI DSS.
11. We free up your time so you can focus on what matters most.
2. Reduced Cybersecurity Costs and Compliance
3.1 Our Story
Through the Years
1999: Funded in Québec under the name of Above Security Inc.
2002: Opening of the 1st SOC in Quebec 2006: Opening of the SOC in Europe 2015: Hitachi Systems, Ltd. acquires Above Security Inc. 2017: Name change to HITACHI SECURITY SYSTEMS Inc. Opening of the (SOC) in Japan.
2022: Hitachi Trusted Cyber Management acquires Hitachi Systems Security
4 SOCs – Security Operations Centers
Global 24/7 Monitoring
3.1 Compliance and Certifications
Compliance with International Standards and Certifications
Complying to SOC II Type 2
Certified ISO 27001 for the delivery of managed security services, Hitachi Systems Security Europe
ISO 9001 certified for the delivery of managed security services from the Canadian head office
Microsoft Silver Partner
PCI Qualified Security Assessor (QSA) for Canada, Latin America and the Caribbean
Certifications held by our employees: CISA/M, CISSP, CIPP/C, CDPO SC-200/900, AZ-900, ISO 27001 LA, GCIA/H, CEH, CRISC, OSCP, CGEIT
3. Our Services
We are your strategic partner in cybersecurity solutions and services
24/7 Managed Cyber Security Services
Professional Services
We are an extension of your team
3.1 Service Menu
24/7 Managed Detection and Response(MDR)
24x7 MONITORING OF CYBER THREATS IN REAL TIME | INCIDENT RESPONSE | CYBER THREAT INTELLIGENCE
Professional Services
ASSESS YOUR SECURITY POSTURE | COMPLIANCE WITH NORMS AND STANDARDS | IDENTIFY RISKS
Incident escalation in less than an hour
Certified Cybersecurity Specialist
Sentinel Health Monitoring
Customer-specific incident response
Vulnerability management
Optimization of detection tools
Establishment and maintenance of SOPs
Monthly reports
Managing Microsoft 365 Defender
Cybersecurity Posture Assessment
Penetration tests and vulnerability analyzes
Microsoft 365 configuration review
Ransomware Resilience Assessment
Digital Forensics
Compliance:PCI DSS, NIST, ISO 27001, GDPR, Law 25
Cyber Threat Intelligence (DarkWeb, etc)
Security Architecture, CISO as a Service
Privacy Compliance
3.1 Our Resources
4. Presentation of the MDR service offer
4.1 Presentation of the MDR service offering
General services included in the MDR service offering:
Monitor, investigate and respond to security incidents reported by Microsoft Sentinel.
Recommend best practices and actions to eliminate the recurrence of security incidents.
Helping the customer manage the Microsoft 365 Defender product suite
Propose measures to improve the overall security posture.
Responding to requests and assisting customers with security-related issues.
Establish and maintain SOPs (standard operating procedure) and playbooks to automate and optimise incident response.
Optimise data ingestion to reduce costs by filtering out low value information.
Monitor and adjust the status of analysis rules, data connectors and the Sentinel environment.
Integrate data sources and adjust analysis rules to improve detection capabilities.
10. Difficulty in developing and maintaining cutting-edge cybersecurity expertise in-house
4.1 Presentation of the MDR service offering on Sentinel
4.1 Presentation of the MDR service offering on Sentinel
Architecture of the Managed Detection & Response (MDR) service components
4.3 Service according to severity levels
4.4 Considerations influencing the level of investment
Microsoft 365 Defender Suite covers several aspects (Identities, Endpoints, Apps, Email, Cloud apps, IoT, Azure SQL/Storage, Azure VMs, Azure Containers, Azure Network, Azure App Services) and each aspect represents a separate source.
For example, if Defender for Endpoints and Defender for Identities are two active sources in Microsoft 365 Defender, then this will be counted as two security controls in the cost of the service.
Number of users
Frequency of service reports
Number of years in Agreement
Number of service checks (ex. AD=1, FW=1, NDR=1,Linux=1, etc).
If vulnerability management: number of IP's to scan and report frequency
Licensing of Microsoft tools are the responsibilty of the customer
4.5 Service offering (price) for Client
Marisol Litalien
BAA, CISM
Territory Manager
Hitachi Security Systems Inc.
955 boul. Michele-Bohec, Suite 244, Blainville (Quebec) J7C 5J6 Canada
T+1 450 434 8060 C+1 514 209 5970
4.7 Prerequisites of the customer to subscribe to the service
Technology Deployment Prerequisites
4.8 Presentation of the MDR service offer on Sentinel – RACI
4.8 Presentation of the MDR service offer on Sentinel – RACI
Here is an overview of the incident detection and response processing workflow
4.9.Presentation of the MDR service offering on Sentinel – Operational RACI
It's crucial to start today!
Your organization needs cyber threat intelligence services to proactively identify, assess and respond to potential cyber threats and attacks, allowing them to minimize damage and reduce their risk of breach.