Security that brings you peace of mind
Managed Security Services
We believe that security is a business problem, not a technology problem, as such, our Security Operations Center is agnostic as it relates to technology. We will monitor and manage your existing technology and if needed provide an objective opinion on the technology that fits your needs, budget, and environment
Scale your security operations
monitor your environment 24x7
We believe that security is a business problem, not a technology problem, as such, our Security Operations Center is agnostic as it relates to technology. We will monitor and manage your existing technology and if needed provide an objective opinion on the technology that fits your needs, budget, and environment.
Brier & Thorn takes a unique approach to managing risk for clients through their Managed Services which include Network Security Monitoring, Managed Detection and Response (MDR), and Managed Penetration Testing
24x7x365 Network Security Monitoring
We monitor and manage your existing security infrastructure 24x7x365 through our ISO 27001 certified Security Operations Center (SOC). We understand that no one client is the same and work on identifying the baseline for your environment to detect abnormalities.
As part of our service, we provide annual penetration testing and quarterly vulnerability scanning proving rounded security services for your team.
Managed Detection and Response (MDR)
Our Managed Detection and Response Services focuses not only on providing 24x7x365 monitoring of security infrastructure but also acting as the first line of defense and responding to active threats.
The objective of our services is to ensure that threats are identified, triaged, and responded to quickly and to reduce the Mean Time to Respond (MTTR).
As part of our service, we will perform Threat Hunting where we will proactively search for threats in your environment.
Brier & Thorn will provide support to your team as it responds to an incident in your environment, trough their process our team will triage with the objective to resume business operations whilst protecting evidence if required.
In parallel to incident response, we will ensure that we preserve evidence in order to perform Forensic Analysis.
This will allow your team to identify the incident timeline and what vector of attack was leveraged in order to compromise your network, which will provide a clear path for mitigation and prevention of future incidents.
Our Service Highlights
Today, there are more network and endpoint security controls generating petabytes of collective log data with not enough people to analyze it than ever before. We didn't believe the solution was to throw more technology at the problem, we believed the solution was to throw critical thinking at it -- human analytic rigor.
So instead of creating another "me too" MSSP that recommends more technology, we built a different kind of company.
We believe that our product-agnostic philosophy allows us to monitor and manage existing tools in your environment or if required our objective recommendations for the implementation of security tools according to your needs, environment, and budget.
Annual Penetration Testing
As part of our Managed Services, our team will perform penetration testing in your environment on an annual basis, identifying vulnerabilities and gaps in visibility for security controls
Brier & Thorn will manage and maintain the security platforms included in scope of our services, this will include upgrades, health and availability monitoring and troubleshooting tier once issues.
Scale your security operations
ISO 27001 Certified
Providing the ability to scale your security operations quickly, with the support of the Brier & Thorn team and availability of a resource dedicated to our customer while maintaining specialized services for day-to-day security and/or compliance operations.
Brier & Thorn obtained its ISO 27001 certification for its managed security services including its Security Operations Center (SOC). This international standard provides a framework in order to safeguard the confidentiality, integrity, and continuity of information.