https://store-images.s-microsoft.com/image/apps.42622.2975141f-5f10-4e22-ad7c-ae3fda180678.aed13ad5-5916-4d44-9a99-b30eccdc4afa.4b6537ac-f662-480f-b571-b4f6f28c5a2d
Spark MDR for Microsoft Sentinel
Spark New Zealand
Spark MDR for Microsoft Sentinel
Spark New Zealand
Spark MDR for Microsoft Sentinel
Spark New Zealand
Microsoft Sentinel SIEM and SOAR offering through Azure Lighthouse managed by Spark New Zealand. Expert 24x7 monitoring and response to events and alerts generated from your Microsoft Sentinel instance.
Spark MDR for Microsoft Sentinel is a Managed Service providing you with expert 24x7 monitoring and response to events and alerts generated from your Microsoft Sentinel instance.
The managed service consists of 4 components that enable the expert teams at Spark to provide managed security outcomes for your Microsoft sentinel instance.
The managed service consists of 4 components that enable the expert teams at Spark to provide managed security outcomes for your Microsoft sentinel instance.
- Security Event Management Service - log collection, event detection and 24 x 7 monitoring. Spark security experts utilise the native SOAR capabilities in Microsoft Sentinel to provide automated response to known threats and utilisation of AI analysis across an organisation to provide insight to abnormal user activities and identity and protect against new threats.
- Security Incident Response - incl. up to 10 incident responses per month from the base service, with additional incident packs available as required. The Security Incident Response Service provides several components, to effectively manage operational security incidents throughout their lifecycle from their creation through to incident closure for in scope logging devices.
- Use case tuning - support of existing use cases built upon Spark’s own use case library. Fine tuning of existing use cases to allow for better detection and reduction of false positives, advanced security event management tuning of use cases specific to the customer’s requirements and Microsoft Sentinel instance
- Reporting - monthly live report walkthrough from a Virtual Security Manager including: Monthly Executive Summary, Log Ingestion Tracking, Security Alert Breakdown and Sentinel Storage Tracking
- Threat Hunting (Optional) - Proactive threat hunting utilising a purpose-built threat hunting capability that Spark uses across its own networks leveraging MITRE ATT&CK framework.
- Virtual Security Manager for Microsoft Sentinel (Optional) – dedicated SecOps resource providing monthly customer review, realisation of Microsoft Sentinel security maturity model deliverables and optimisation of managed detection and response effectiveness
- 24x7 coverage - Real time monitoring, triage, incident investigation and remediation by Spark’s NZ based Security Operations Centre
- Optimised Security Operations through access to highly experienced security analysts
- Reduction in security alert fatigue from Spark security automation
- • Holistic threat visibility with Spark Threat Intelligence including exclusive Malware Free Networks (MFN) feeds from the GCSB’s National Cyber Security Centre.
Learn more
Spark MDR for Microsoft Sentinelhttps://store-images.s-microsoft.com/image/apps.30728.2975141f-5f10-4e22-ad7c-ae3fda180678.aed13ad5-5916-4d44-9a99-b30eccdc4afa.513dcf01-1753-4e20-bad7-dcc5a90977eb
https://store-images.s-microsoft.com/image/apps.30728.2975141f-5f10-4e22-ad7c-ae3fda180678.aed13ad5-5916-4d44-9a99-b30eccdc4afa.513dcf01-1753-4e20-bad7-dcc5a90977eb
https://store-images.s-microsoft.com/image/apps.37447.2975141f-5f10-4e22-ad7c-ae3fda180678.aed13ad5-5916-4d44-9a99-b30eccdc4afa.5435f9f8-2c9d-42eb-a052-281fe910b4f2
https://store-images.s-microsoft.com/image/apps.7570.2975141f-5f10-4e22-ad7c-ae3fda180678.aed13ad5-5916-4d44-9a99-b30eccdc4afa.27df9737-410b-4ea4-a9e5-d93654a04c8f