Volexity specializes in network hunting and monitoring network traffic for signs of suspect and malicious activity. Through deployment of its network monitoring devices, Volexity is able to get both micro and macro level visibility into what is happening on your network. Solutions are designed to be both short and long term deployments, as well as in proactive or reactive capacities. Volexity typically deploys network security monitoring devices in support of Incident Response investigations and in support of some Proactive Threat Assessment engagements. Leveraging a combination of open source and proprietary data and signatures, Volexity is able to bring events to light that often go unnoticed.
The goal of each relationship Volexity has with a customer is to make it an actual partnership, as opposed to simple transactions that meet the bare minimum requirements. Volexity is there to investigate possible security incidents, recommend optimal security solutions, provide subject matter expertise, and help improve the overall security posture of your network and systems within it.
Volexity offers services to monitor your network for signs of suspect or malicious activity by deploying its Network Security Sensors (NSS) . Functioning as an intrusion detection system (IDS), threat intelligence platform, and network traffic investigation device, the Volexity NSS acts a force multiplier and time saver when it comes to incident detection and response. There is no minimum or maximum number of locations for NSS deployments. Devices automatically monitor network traffic and send alerts back to Volexity for triage and analysis.
All incoming alerts are handled by a Volexity analyst and triaged appropriately. The alerts are dispositioned as a confirmed incident, suspect incident, or non-incident. The incident classification guide and process for each incident type is detailed below. The analysis of alerts, validation or invalidation of the alerts, and reporting to the customer (if required) are all included as part of the Network Security Monitoring service that comes with the Network Security Sensors.
Volexity works with the customer to create an escalation plan for designating points of contact. Various scenarios and contact points can easily be coordinated and accommodated.
Volexity NSS devices can also be leveraged in a short-term proactive deployment. Typically these engagements involve instrumenting a network for a brief period to determine if there is anything to be found. Additionally, this service may leverage proactive collection of system memory, selective files, and even full disk over the network for forensic analysis. This can be done to spot check systems that have been deemed critical or that have otherwise shown signs of suspect activity. Short-term proactive deployments can be deployed as part of the Volexity Proactive Threat Assessment.