Recon InfoSec
Contact Us
Recon InfoSec

Managed Security Operations

Recon provides 24/7 monitoring of your full range of endpoints, network, SaaS, email and more. We partner with internal information technology and security teams of any size to provide additional telemetry and threat intelligence for unparalleled detection, triage, investigation, incident response, threat hunting, and expert guidance in remediation. Our dedicated security experts eliminate immediate threats while providing comprehensive security operations.

Bring new levels of confidence to your enterprise security.

Schedule a Consultation

Comprehensive

We work with your team to resolve incidents and eliminate threats – from early warning through detection, investigation, and response. Recon's Managed Security Operations are powered by a comprehensive cybersecurity stack that includes a fully managed SIEM and SOAR. Our platform is engineered to facilitate comprehensive security operations that lead to supreme confidence.

Managed Security Operations

Includes:

Managed Detection and Response (MDR)

As part of Recon’s service, customers receive 24x7 monitoring, detection, and response services across all of their workstations, servers, active directory, and cloud applications. MDR provides a foundational level of protection for Recon’s full MSO service.

  • What (if any) response actions is your current MDR provider taking for you? Do they have to wake you up in the middle of the night?
  • How often do you get to connect directly with the analyst writing detections for your environment? How long would it take for you to get on a call with them? How many personalized detections have you or your current provider created in the last year?

Advanced Email Protection (AEP)

Fully managed email security powered by Sublime and Chronicle SOAR. AEP combinines best-in-class email security tooling and the correlation and automation capabilities of Chronicle SOAR with the expertise of Recon’s SOC to deliver a comprehensive email security solution that is able to catch cutting-edge adversary techniques including brand spoofing and QR code phishing.

  • How does your current MDR/MSSP handle email security? Are they managing it for you?
  • Does your current provider handle your user reported emails? Are they using those to create new and stronger detections?
  • How many personalized detections have been created for email in the last year by you or your current provider?

Endpoint Detection and Response (EDR)

As part of Recon’s service, customers receive licenses for our advanced endpoint detection and response agent (Lima Charlie). Our agent installs with no-reboot and provides powerful, custom alerting tailored to your environment. For our customers who have already invested in endpoint tooling, we will integrate with those tools to better enrich our visibility into their environment.

Perimeter Network Monitoring

Recon’s service does not stop at the endpoint. Recon’s SOC monitors your environment for security-relevant telemetry across your network perimeter including VPNs and firewalls.

Cloud Authentication and Identity Monitoring and Response

Monitoring identity telemetry and responding to suspicious logon behavior is a critical way to stop attacks before they can get started. Recon actively monitors our customer’s identity logs for suspicious activity and leverages best in class orchestration and automation techniques to catch not only suspicious login activity but also the follow-on activities that others miss.

Full assurance that our systems are secure

The personal attention given by Recon’s staff in setting up our security is invaluable. The systems and procedures they set up for us are exactly what we need to meet our financial industry compliance requirements. Further, the ongoing monitoring and assistance they provide allows us to concentrate on developing our applications without distractions, but with full assurance that our systems are secure.

Chief Information Officer
Financial Sector

Tactical Threat Intelligence

Recon InfoSec tracks threat intelligence across the industry and curates that intelligence according to what’s relevant to your industry and your organization. Threat intelligence permeates every aspect of our service and is a primary driver for new detections, Threat Hunts, and Security Guidance.

How specifically is your team/organization benefiting from threat intelligence? Does it end up in a stack of reports collecting dust? How is your current provider using that intelligence to make your organization safer?

Deception Systems (Canary Systems/Tokens)

Recon collaborates with clients to deploy canary systems in their network that mimic high-value assets. These canary systems provide a low-noise, high-fidelity alert signal to Recon’s SOC. Recon continuously monitors these canary tokens and systems for suspicious behavior.

Is your current MDR provider helping you deploy canary systems in your environment? Do they help you think strategically about where you place those systems to generate the best indicator possible?

Proactive Threat Hunting

Recon’s SOC actively monitors intelligence sources, searching for indicators, gaps, or potential vulnerabilities for our team to use as hypotheses for a hunt. Our team then forms their hypothesis using an “assumed breach” mentality and combs through our customers' logs looking for potential indicators of a threat. The findings of those hunts are then used as the basis for new detections to make our customers continuously safer from emerging threats.

  • Ask your current provider: what do they mean when they say “threat hunting” and how they are leveraging those findings to make your organization safer? Are they just investigating alerts?
  • What kind of access does your current provider give you to their threat hunters? Do you know their names? How long would it take you to get on a call with them to discuss an interesting case?

No stone was left unturned

Every single member of my security group fully appreciated working with a team of Recon InfoSec’s caliber. Their focus on the golden triangle of people, processes, and technology meant no stone was left unturned in our aim to move up the maturity curve across our full suite of security services.

Vice President of Governance, Risk, and Compliance
Regional Bank

Recon Security Operations Portal

The Recon Security Operations Portal provides customers with a consolidated view of their security posture across their entire network. Recon’s customers can log into the Portal to see their asset inventory, log sources, integrations, and view the active cases that the Recon SOC is investigating. Customers can also leverage the chat function in the portal to get direct access to the analysts that are conducting threat hunts, writing new detections, and protecting their environment from bad actors.

  • Is your current provider providing you with a dashboard for all of your security tools or just for their own agents?
  • Is your current provider’s chat function just another AI bot or is it giving you direct access to the analysts who are protecting your network every day?

Incident Response

All of Recon’s agreements come with 30 hours of incident response work included. In case of a major incident, our team knows your environment better than anyone else and will be able to respond quickly. Our team will work to contain the incident and remove the bad actor as well as begin performing a root cause analysis.

What kind of support does your current provider have in case of an incident?

Security Guidance for IT and Operations

In order to operate efficiently and securely in a digital environment it is crucial to have solid collaboration between security operations, risk management and network operations. As part of the MSO service Recon brings the expertise from the security operations perspective to that triangle of collaboration. Included in Recon’s service are monthly meetings where the notable cases from the previous month are reviewed and where we can provide recommendations on existing risks and approaches to remediate those risks.

Active Risk Management Guidance

If we are “guarding the house” and we see a “broken window” we are going to recommend you get that window fixed. This type of guidance will be proactive, but we will also be available to answer questions about how much risk we see in particular approaches/decisions and recommendations on what next steps a client might want to take to improve their security posture.

We consider Recon InfoSec our business partner

We consider Recon InfoSec our business partner and one of our main resources for IT security. We believe organizations of any size would benefit from working with them. Their people were great to work with, knowledgeable, and very professional.

Service Delivery Manager
Healthcare

Get Started

Let us know how we can contact you, what you would like to know, and how we can help.

chevron-down