Skip links

Our Triarii MDR service

Our Triarii MDR service comes with all the tools needed to keep your systems and environment safe from cyber-threats. Here are the features you will get as part of the service.

Security Information and Event Management (SIEM)

Collection, indexing, filtering and alerting of suspicious log activity. We find the needle in the haystack – we sieve through millions of logs to identify what needs investigating, eliminating false negatives and positives.

File Integrity Monitoring (FIM)

Identify unexpected or unapproved activities with files on user devices and servers, stopping the activity before it takes hold of the device / operating system.

Suspicious email analysis

Our analysts investigate emails deemed suspicious by users. By analysing the source and content of such messages we are able to provide an assessment of the threat and recommend actions to be taken.

Endpoint Detection & Response (EDR)

Protect your endpoints against a variety of attacks through enhanced monitoring at the device level to spot intrusion earlier and, if appropriate, isolate the device until further investigation reveals next steps remedial action.

Security configuration assessment

Monitor system and application configurations against security policies. Alert you about vulnerable, insecure systems to tighten defences and ensure compliance.

Machine learning

Machine Learning algorithms react to your environment reducing the time for detection of potential malicious activity and rapidly detect threats irrespective of whether behaviour is ‘known’ or ‘unknown’.

Full feature list

Alerting any time, day or night, including weekends and bank holidays.

Any time, day or night, weekday, weekend or bank holiday, we will let you know if and when a breach looks to be starting.

Summary reporting of the incidents raised and dealt with over the prior period at both a business and technical level.

Our analysts manually search log data, looking for the signs of intrusion which the automated systems miss.

Monitors the deep, dark and surface web for instances of usernames & passwords associated with customer’s domains.

Send questionable emails to our Cyber Security specialists who will investigate and advise as to their threat level / safety.

Get ahead of attackers by identifying risk areas in your network and taking remedial action to protect against attack before it happens.

Collection, indexing, filtering and alerting of suspicious log activity.

Monitoring of changes and updates to key files and their attributes.

Protect user devices against multiple threat vectors including viruses, malware and file-less attacks. Find out more here.

Monitor networks and / or systems for known and sometimes unknown malicious activity and policy violations.

Customers have access to the same data as our SOC Analysts, able to see log events, alerts and analytics first-hand.

Leverage multiple sources to collate information about threats and threat actors that will help mitigate harmful events.

Leverage trusted external data sources to enrich log data and increase usability / identifiability (e.g. Geographical enhancement of IP addresses to identify source location).

Ability to hold data in memory to facilitate near-instant searching.

Monitor system and application configurations against security policies.

Reduces the amount of data that needs to be transferred to the SIEM solution.

Encrypts the data prior to being transferred to the SIEM.

Ensures the successful receipt of log data.

Enhance human curiosity with automated elements to accelerate anomaly identification and remediation.

Consistent policy management and processes.

Are you heavily invested in the Microsoft Azure platform?

Standout service from Falanx cyber security analysts

No onboarding fee, no hidden costs.

UK Based SOC

All our services are delivered by our approachable and experienced team of cyber specialists working as an extension of your IT team.

Turnkey Service

Simple to roll-out and designed to fit within your existing security processes, our MDR service works across your whole organisation, securing your entire environment.