Essential for organisations that must demonstrate compliance with Security Policy Framework and CESG Good Practice Guide 13.
Are you covered?
Get continuous protection from cyber threats, process failure or technology and human error with our GPG-13 Protective Monitoring service. Choosing the right service provider is key to demonstrating compliance, get peace of mind with fully-managed, remote monitoring of your network, expert analysis of data, and service desk support.
Show compliance and get peace of mind
Keeping you covered, our protective monitoring is conducted to UK Government recommended standards and employs the latest in real-time cyber vigilance. Our system effectively combines technology and expert human analysis to pinpoint vulnerabilities and threats to your network and critical assets. The service includes real-time alerting for swift remediation and daily and monthly reporting for longer term trend analysis.
Always on guard
24×7, fully-managed, remote monitoring of threats to Information Security and IT systems.
GPG-13 defined controls
UK Security Cleared (SC) analysts and suitable for environments up to OFFICIAL-SENSITIVE.
Aware – Deter levels
GPG-13 protective monitoring available at either AWARE or DETER service levels.
UK sovereign service
UK based service, delivered by a UK company. Rest assured that your data remains in the UK.
Rich set of controls
Get protective monitoring controls providing alerts, reports and support for incident resolution.
Choosing a provider with provenance and accountability is key to demonstrating compliance.
“Working with Falanx we’ve been able to build information security into our IT solution from the design stages, safeguarding the information we process. All tests indicate we’ve developed a very strong, secure system”
Arne Wolters, The Health Foundation
“Falanx have always worked closely with us to define the correct scope to meet risk appetite and cost constraints and have been professional in every aspect of their approach. We continue to use Falanx for all of our testing needs and foresee this being the case for the future.”
James Crane, Seven Investment Management
Is my business a good fit?
Here are some questions we are often asked to help you decide. If you have any further questions about GPG-13 Protective Monitoring, please contact us via email firstname.lastname@example.org or on (0)20 3747 4651.
How long will it take to set up?
It depends on the size of the monitored environment and devices being monitored. For small to medium size monitoring requirements we can often be collecting, processing and analyzing data within 10 working days.
What do you monitor?
Our primary focus is security enforcing systems (e.g. Active Directory or Anti-Virus Consoles) and those able to provide indication of malicious activity (e.g. DNS Servers).
What if my business needs change?
Our utility model allows you to increase and decrease the scope of the monitored environment. We can also monitor environments which have limited uptime (e.g. disaster recovery systems) for a significantly reduced cost.
How much will it cost?
Our monitoring services are bespoke to fit our clients. We deliver services that closely align with individual requirements and objectives. Please contact Falanx Cyber Defence for a confidential conversation regarding your requirements.
Is protection monitoring continuous?
We offer different levels of service to suit your business requirements. These include core hours monitoring (7am – 7pm), out of hours monitoring with automated toolsets and on-call responders or 24×7 manned monitoring.
How do you ensure that my log data is secure?
Data is encrypted at the point of collection to ensure it can’t be read or modified by unauthorized parties. Customers are provided with their own dedicated monitoring instance and all customer data is stored in separated containers.