Endpoint protection in different layers. With "Magenta Protect" you get next-generation virus protection to prevent attacks. If you want more protection, "Magenta Defend" adds Endpoint Detection & Response, which gives you insight into proactive detection, and finally "Magenta Power Shield" gives you complete protection that you can combine with complementary modules as needed.
Overview
Managed detection and response (MDR) is a cybersecurity service that combines technology and human expertise to perform threat hunting, monitoring, and response. The main benefit of MDR is that it helps rapidly identify and limit the impact of threats without the need for additional staffing.
The main services provided by T-Systems include the following features. Please reach out to figure out more details about it and how T-Systems can collaborate with your security environment.
Endpoint Administration
- Licenses included
- Fully-managed deployment
- Realtime agent management
- Policy tuning
- No reboots required on most platforms
- Monitored 24x7
Incident Response
- Runbooks tailored to customer requirements
- Develop and manage remediation plan
- Execute remediation plan for managed systems
- CERT coordination for contracted systems
24x7 SOC
- Named SOC Lead
- Incident response team
- Weekly status calls
- Quarterly review
- GDPR Covered
Reporting
- Asset discovery & status
- Event summary w/ analysis & recommendations
- Executive summary
- 360° View
This solution is hosted in multiple AZs in AWS, which provides a highly available service for our customers. We use serverless technology (AWS Lambda), containers (AWS EKS), Amazon EC2 and more.
Highlights
- Resilience: Proper resilience builds the foundation of a sustainable and viable IT. Broaden the ability to sustain operations, recover rapidly and mitigate the consequences when a cyberattack occurs.
- Compliance: Non-compliance is a business risk. Understanding the requirements of relevant standards and regulations, permanently monitoring them and supplying AI, compliance controls become more efficient and transparent.
- Zero Trust: The complex environment of a corporate network demands new approaches to trusting devices, based on confidence of device identity and device health in combination with user authentication -” Never trust, always verify”.
Details
Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.