What kind of security monitoring do you conduct?
We monitor your systems for potential security events. We install our monitoring agents on your servers and critical workstations. We also ingest AWS CloudTrail and VPC logs. We ingest logs from your Office 365 platform or Google Workspace. If we notice an anomaly, we'll alert you about the attack pattern along with recommendations on how to prevent the attack.