Modern IT environments generate a vast amount of telemetry that can be of significant security value, but only with skilled eyes analysing it and making insights visible.
Inde brings a forensic perspective to this data with our managed Security Information and Event Management (SIEM) offering.
It is a cost-effective packaged service to store and correlate logs from devices across your environment, and produce analysis and early warning of security anomalies is what Inde delivers.
External threats are ever-present and have evolved beyond what traditional antivirus can reliably protect organisations from. Detection technologies must provide full coverage of pre-execution, execution and post-exploitation activity.
Endpoint Detection and Response (EDR) provides this visibility to your environment, making it an essential tool in the security arsenal of any organisation.
Inde partner with SentinelOne to deliver a managed EDR service that centralises endpoint and network visibility across your entire workstation and server fleets, and enables you to gain extensive real-time and forensic coverage of exploits, malware, malicious documents and scripts, fileless attacks and lateral movement using the SentinelOne platform.
Meet Scott Parker, Security Architect.
Scott brings the same curiosity and exploration to solving our client’s security challenges as he does to finding new trails to unleash his mountain bike on.
Working alongside some of New Zealand's most influential businesses to enhance their overall organisational security posture, Scott has 15 years under his belt.
Since returning home to New Zealand 6 years ago, Scott has held senior roles with CCL and Inde. Scott’s constant focus is on having security-minded conversations with clients across all regions and within all verticals present in the NZ market. The outcome? Practical advice to organisations looking for security expertise and guidance.
During his time in the security space; Scott has had the privilege of working with NZ organisations in the following verticals: government, health, education, finance, retail, industrial and corporate to deliver outstanding service and advice to produce viable business outcomes on time and to budget.
Scott says, “My passion is talking to people and businesses about practical security initiatives and technology, helping them remove any industry ambiguity and focus on what’s important in their business.”
Outside of work, Scott is a keen mountain biker and is always looking to explore new trails!
Services and data are expected to be available 24/7 in and out of the office environment, while the threat of a security breach and information loss remains ever-present.
The best defence is a clear view of exactly what is happening in your environment, paired with expert advice on how to implement a mature approach to security. Inde helps organisations enhance their security posture with best-of-breed security products supported by a team of highly experienced and dedicated security professionals.
Our Managed Security Service takes a pragmatic approach to security - balancing compliance, strength, access and usability. Our goal is to enable organisations to move beyond compliance-focused security and develop true defence in-depth: we value effective controls that manage real risks, not just tick boxes.
Over 90% of breaches are attributed to phishing.
A traditional approach to Security Awareness Training has involved teaching users to identify phishing messages and punishing those who fail to do so. The Inde way is to empower your staff by giving them the means to report phishing and receive feedback, operate an interactive and supportive education program, and condition users through repeat, realistic simulation of the varieties of phishing that their organisation is being faced with.
Inde has selected Cofense as its Security Awareness platform as it excels at enabling organisations to tailor training to their specific needs with scenarios derived from threat intelligence. As well as being a platform for training, the Security Orchestration, Automation and Response (SOAR) component of Cofense integrates with mail clients and mail services to provide security teams with a phishing investigation and response facility.
Regular reviews of IT systems and policy helps to ensure that your operations are not exposing your organisation to undue risk. Inde’s assessment framework is built on a comprehensive set of controls derived from industry contributed data and learnings from real-world security incidents, and aims to develop a security roadmap that is easily understood at all levels of your organisation.
Our approach to Security Assessment engagements is both theoretical and hands-on, identifying security flaws, verifying the effectiveness of implemented security measures, and making certain that all measures will continue to be effective after implementation and tuning. All assessments are supported by Offensive Security Certified Professional (OSCP) qualified engineers. Inde can also perform security and health reviews of specific infrastructures and services such as core networking and network appliances, cloud and server platforms, Active Directory, PKI, Exchange and SQL.
Having a mature security governance model in place is essential to understanding your critical business functions, identifying vulnerabilities, establishing a risk management strategy, and developing a business continuity approach. With CISO (Chief Information Security Officer) level expertise in-house, Inde can assist with developing pragmatic governance frameworks and security policies which meet your business and legal needs.
Every deployment of a new service or infrastructure Inde performs is designed with a security-focused mindset. We can help ensure new systems are implemented so they are aligned to industry best practices to guard against known security vulnerabilities, as well as being positioned to limit future exposure to threats.
Even with the best security protections and policies in place, security incidents will still occur. Inde can help your organisation recover from a security breach by identifying the root cause and affected systems, restoring lost or compromised data, and implementing remediation steps to mitigate future risk of the same or similar events.