(440) 333-5903 info@tec4it.com

Managed Security

Nearly every organization will likely face a data security breach this year, but it’s your response that truly matters.

 

TEC Communications Inc » Managed Security

Get Started

Incorporate a Managed Security Operations Center to enhance security swiftly, meet compliance requirements, and reduce risks cost-effectively.

When clients choose our Managed Security Operations Center (SOC), they see that we handle all their cybersecurity needs, so they can focus on their business.

With TEC’S Managed Services, we take care of the problems, giving you more time to keep your business running smoothly.

Managed Security & Compliance Services

COMPLIANCE

  • Business Continuity Framework Planning
  • vCISO Advisory/Consulting (GRC Services, Policy Audit)
  • Compliance Framework Readiness Assessment(s)
  • NIST 800-53 Gap Assessment
  • CMMC/NIST 800-171 Gap
  • Assessment
  • NIST CSF Gap Assessment
  • CIS Top 18 CSC Gap Assessment
  • SOC 2 Readiness Assessment
  • PCI Audit
  • PCI Gap Assessment
  • HIPAA Gap Assessment
  • ISO Gap Assessment
  • CJIS Gap Assessment
  • GDPR Gap Assessment
  • State Data Privacy Assessment
  • Custom Assessment – Any Framework or Requirement Set
  • NYCRR Gap Assessment

MANAGED SERVICES

  • 24x7x365 S. Based Security Operations Center
  • ProVision Monitoring & Alerting (SIEM)
  • ProVision Security Device Management
  • Managed Detection & Response
  • Patch Management (iVanti/Tanium)
  • Security Device Management
  • Compliance Management Portal
  • Managed Proofpoint
  • Managed Tanium

INCIDENT RESPONSE

    • Incident Response Program Development
    • Incident Response Plan/Playbook Development
    • Incident Response – Proactive SLA & Reactive
    • Compromise Assessment
    • Incident Response Gap Assessment
    • Block of Advisory/Consulting Hours

TESTING

      • Vulnerability Assessment
      • Autonomous Penetration Testing-as-a- Service
      • External Network Penetration Testing and Vulnerability Scan
      • Internal Network Penetration Testing and Vulnerability Scan
      • ASV Scanning
      • Application Security Testing
      • Cloud Security Assessment
      • Mobile Application Testing
      • Wireless Testing
      • Physical Security Testing
      • Red Team Testing
      • Email Phishing
      • SMS Phishing
      • Vishing (Phone Social Engineering)
      • Password Complexity Validation

 

Skip to content