{"id":168,"date":"2017-03-22T18:36:51","date_gmt":"2017-03-22T18:36:51","guid":{"rendered":"http:\/\/zed.inguardians.com\/?page_id=168"},"modified":"2024-03-07T18:35:36","modified_gmt":"2024-03-08T01:35:36","slug":"blueteam","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/blueteam\/","title":{"rendered":"Blue Team"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2016\/09\/blue-team-tablet-e1550262359485.jpg” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/08\/APT.png” align=”center” _builder_version=”4.16″ width=”40%” module_alignment=”left” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”||||||||” text_text_color=”#ffffff” text_font_size=”20px” header_font=”||||||||” header_text_color=”#ffffff” header_font_size=”74px” header_font_size_tablet=”” header_font_size_phone=”41px” header_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n

Protective Services<\/h1>\n

Prevention, detection, and containment<\/strong><\/p>\n

InGuardians Protective Services Team delivers expert guidance to your IT employees, stakeholders and management in order to better defend their assets against targeted threats.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ background_color=”#003c6b” background_color_gradient_direction=”181deg” background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/02\/golf_course_13.png” background_size=”initial” background_position=”center_right” background_blend=”color-burn” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”row” module_id=”in-team-info” _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Blue Team Description” _builder_version=”4.16″ text_font=”||||||||” text_font_size=”17px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark” text_font_size_last_edited=”off|” global_colors_info=”{}”]InGuardians Protective Services Team delivers expert guidance to your IT employees, stakeholders, and management in order to better defend their assets against targeted threats. \u00a0In addition to Proactive Hardening and Security Architecture Services, InGuardians Protective Services also include\u00a0 Threat Hunting and Incident Response.<\/span><\/p>\n

All of our Protective Services begin with building a threat profile of the client. \u00a0In this process, our entire team identifies the threats and actors that pose the most risk to your organization. \u00a0We can then use the threat model to determine the most effective security controls to deter the attacks, in addition to implementing audit measures to determine when breaches occur.<\/span><\/p>\n

The services below are a subset of what InGuardians can do for your organization.<\/strong> <\/em>\u00a0<\/span>
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.16″ custom_padding=”54px|0px|52px|0px” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” padding_mobile=”off” global_colors_info=”{}”][et_pb_row module_id=”securityarchitecture” _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#0c71c3″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Security Architecture Review” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]InGuardians analyzes your security architecture and provides recommendations on controls and audit measures.<\/i><\/p>\n

InGuardians\u2019 Security Architecture Reviews are broad-ranging and provide an in-depth analysis of your information security controls and audit measures. Our guidance, presentation, and report will help your team understand the current strengths and weaknesses of your security architecture, and provide a roadmap to construct stronger defenses and become more resilient to attack.<\/span><\/p>\n

InGuardians assesses existing policies & configurations, interviews key stakeholders, and measures control and audit functions to identify gaps, deficiencies, and build a plan to remediate them.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#0c71c3″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Purple Team Training” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]InGuardians believes that security success comes when \u201cRed\u201d works with \u201cBlue\u201d in a non-adversarial partnership.<\/span><\/em><\/p>\n

The heart of an InGuardians\u2019 Purple Team is the collaboration between your team and our Operators.\u00a0 Each training is customized and tailored specifically to the needs of your team and overall business requirements, making each Purple Team Training unique.\u00a0 We cover every aspect of the attack chain, from the edge of your network through domain compromise and beyond. <\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” border_color_all=”#0c71c3″ box_shadow_style=”preset1″ global_colors_info=”{}”][et_pb_accordion_item title=”Security Program Assessment” open=”on” _builder_version=”4.16″ global_colors_info=”{}”]InGuardians analyzes your security program and provides recommendations on protective controls and audit measures.<\/i><\/p>\n

The threat landscape facing organizations today requires a defensible architecture complete with preventative controls and detailed monitoring capabilities. \u00a0InGuardians Security Program Reviews helps your team defend your enclave, deter threats, and dominate your domain.<\/p>\n

These reviews provide detailed analysis of your current security program and provides your organization with a roadmap to achieving your security goals.
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_color_all=”#0c71c3″ global_colors_info=”{}”][et_pb_accordion_item title=”System Hardening Assessment ” open=”on” _builder_version=”4.16″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” box_shadow_style=”preset1″ global_colors_info=”{}”]Locking down systems with custom configuration changes and tools<\/i><\/p>\n

Proactive security measures disrupt or contain a bad actor\u2019s attack. \u00a0InGuardians\u2019 operating system hardening and assessment service uses configuration steps and open source tools to block the initial compromise or contain its thread. \u00a0Determine your gaps from standards and leapfrog into best practice. This starts at the operating system and application-level configuration settings, moves on to custom SELinux or AppArmor profiles and continues with local system instrumentation. \u00a0Past customers of this service have run the gamut from DevOps to security appliance vendors to universities.<\/p>\n

Request InGuardians hardening services on production systems or on systems you have in development.
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.16″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_color_all=”#0c71c3″ global_colors_info=”{}”][et_pb_accordion_item title=”Risk Mitigation Assessment” open=”on” _builder_version=”4.16″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” box_shadow_style=”preset1″ global_colors_info=”{}”]Following a penetration test, InGuardians will perform validation testing in order to evaluate the effectiveness of our client\u2019s remediation efforts.<\/span><\/em><\/p>\n

Our team will also recommend industry best approaches to address any outstanding vulnerabilities with an action plan that considers not only the technology but, more importantly, the business objectives of your organization.<\/span>
\n[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion _builder_version=”4.24.2″ toggle_font=”||||||||” toggle_font_size=”20px” body_font=”||||||||” body_font_size=”17px” border_color_all=”#0c71c3″ global_colors_info=”{}”][et_pb_accordion_item title=”OWASP Software Assurance Maturity Model (SAMM) Assessment and Consulting Service” open=”on” _builder_version=”4.24.2″ border_radii=”on|6px|6px|6px|6px” border_width_all=”0px” box_shadow_style=”preset1″ global_colors_info=”{}”]InGuardians\u2019 Software Assurance Maturity Model (SAMM) Assessment and Consulting Service <\/span>reviews and provides guidance to strengthen our clients’ Secure Software Development Lifecycle (SDLC).<\/span>.\u00a0 Leveraging OWASP\u2019s SAMM (<\/span>https:\/\/owaspsamm.org\/<\/span><\/a>) framework, our team of seasoned security experts guides your organization through the intricate pathway of building and enhancing software security posture via the following measures:\u00a0<\/span><\/p>\n

 <\/p>\n