security services

A Complete Security picture& service in the real time, Texum have made the investment in the tools, resources and process to meet the demand for security information.

  • Log Consolidation – centralized logging servers.
  • Threat Correlation – the artificial intelligence used to sort through multiple logs and log entries to identify attackers and behaviors.
  • Incident Management – workflow – What happens once a threat is identified? (link from identification to containment and eradication). Notification – email, pagers, informs to enterprise managers Trouble Ticket Creation Automated responses – execution of scripts (instrumentation) Response and Remediation logging.
  • Reporting Operational Efficiency/Effectiveness Compliance / SOX, HIPPA, FISMA…. Ad Hoc / Forensic Investigations