Advanced Threat Analytics Installation
$2 500 projectADD TO CART |
Advanced Threat Analytics (ATA) identifies three main types of threats: cyberattacks, abnormal activities and problems, and security risks. ATA technologies are capable of detecting various types of suspicious activity at different stages of an attack, including:
- Information gathering: Attackers collect data about the network structure and devices such as servers, network storage, or PCs.
- Implementation: Attackers spread malware within the network using software vulnerabilities, or unsafe service and server settings.
- Domain management: Attackers collect information to resume the attack using different credentials, entry points, and vulnerabilities.
IT Partner:
- Conduct research on customer infrastructure to develop an appropriate architecture solution.
- Design the ATA architecture.
- Prepare the environment for ATA installation.
- Install and configure the ATA service.
- Provide basic training on working with ATA.
- Coordinate client resources and staff schedules.
- Assign a dedicated point of contact responsible for liaising with the IT Partner.
- Coordinate any outside vendor resources and schedules.
- Configure all networking equipment, including load balancers, routers, firewalls, and switches.
- Review and approve engagement deliverables in a timely manner.
- Advanced Threat Analytics license.
- On-premises or hybrid Active Directory domain.
- The plan will be customized based on specific needs.
- Kick-off meeting.
- Conduct infrastructure research.
- Prepare the environment.
- Install and configure ATA.
- Verify and address any issues.
- Successful installation of Advanced Threat Analytics
- Administrators can use the ATA Centre to view reports and notifications.
