How is our data stored and protected and for how long?Why do I need Secuvant if I already have a firewall? What Gap Analysis do yo

How is our data stored and protected and for how long?Why do I need Secuvant if I already have a firewall? What Gap Analysis do you provide?

About to Cyberspace!

About the author
Camila

2 thoughts on “How is our data stored and protected and for how long?Why do I need Secuvant if I already have a firewall? What Gap Analysis do yo”

  1. [tex] {\pmb{\underline{\sf{Stored \ and \ Protection \ of \ Data …}}}} \\ [/tex]

    Long term storage is determined during your contract negotiation; each company has different compliance needs. Typically, log storage is 365 days (cold storage).

    ➫ For incidents where data needs to be retrieved (outside of the 10-day active index), you would work with a SOC Analyst determining the time range, user or machine affected, and type of log source, and we will repopulate the SIEM events in collaboration with our SIEM vendor.

    ➫ Log storage is based in the SIEM vendor’s private cloud (S3 buckets) and protected by various means such as RBAC, encryption, and by using a vendor with a SOC II attestation.

    [tex] \\ {\pmb{\underline{\sf\purple{Need \ of \ Secuvant \ despite \ of \ Firewall …}}}} \\ [/tex]

    Security is about having multiple-layers and a firewall provides a critical layer, but it is only one of many areas that you need to consider.

    ➫ Secuvant can show you the gaps you may have in your security, where your security baseline is today and create a comprehensive security program to get your business at the optimal level of security and cost.

    ➫ A firewall is a great start, now let’s take security further to enable your business.

    [tex] \\ {\pmb{\underline{\sf\green{Gap \ Analysis …}}}} \\ [/tex]

    Secuvant has a very well defined methodology that covers over 100 areas of cyber security for small and medium businesses.

    ✎ These areas are based on industry standards and governance requirements that are applicable to your market.

    ✎We use both quantifiable and qualified information to find the gaps in your current posture. We use a combination of scanning tools, workshops and our own modeling to find and address gaps that will enable your business to address risks.

    ✎ Using this model, we identify all known risks, and give you recommendations on how to address them.

    ✎ You then make business decisions on where you want to take your strategy, with our help. The Gap analysis will be used to create a comprehensive security program customized to your business.

    Reply
  2. How is our data stored and protected and for how long?Why do I need Secuvant if I already have a firewall? What Gap Analysis do you provide?

    Hope it helps you!

    Reply

Leave a Reply to Everleigh Cancel reply