Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

EVVO Cybersecurity to help SMEs in Singapore improve their security posture

Nurdianah Md Nur | July 26, 2016
Its newly launched security operations centre will function as its threat defence and mitigation facility.

EVVO Cybersecurity — a Singapore-based cybersecurity and cloud solutions provider — has launched a Security Operations Centre (SOC) to cater to small and medium-sized enterprises (SMEs) in the republic.

The facility will function as EVVO Cybersecurity's threat defence and mitigation facility, according to the company's press release.

It will leverage automation software for level one tasks for security analysts such as assigning automated, playbook-based workflows to incidents for immediate and scalable response. This will also enable EVVO Cybersecurity to increase productivity and accuracy enabling them to track and improve processes over time.

"Within security operations, many tasks take up additional time and a large volume of events are processed everyday," said Edmund How, Managing Director of EVVO Cybersecurity."By automating our Security Operations Centre (SOC), we not only optimise costs and reduce reliance on manpower, but also dedicate more time to customize security protection for our customers."

Besides that, the SOC will offer the following security services:

  •  Thorough monitoring of digital infrastructure
  •  Proactive continuous defence against advanced cyber threats that can bypass traditional perimeter defences
  • Advanced enterprise endpoint protection that detects, mitigates and remediates advanced malware, Advanced Persistent Threats (APTs) and zero-day attacks
  • Round the clock log collection, analysis, active monitoring and alerting

To empower SMEs to go beyond the traditional SOC functions of merely monitoring perimeter security, EVVO Cybersecurity is also offering EVVO360, a cybersecurity analytics platform, and a suite of cybersecurity intelligence solutions. These allow "endpoints data and network traffic can be correlated rapidly", thus enhancing the ability of organisations to detect, response and recover from incidents of compromise, said How.

 

Sign up for Computerworld eNewsletters.