https://store-images.s-microsoft.com/image/apps.28859.5c7c2661-3c58-4061-9040-cdd0a4df5c71.99fae26a-ac3d-45b4-b3b5-fe8ead3af5be.dcd48e51-0fa5-40b5-88b1-4eaaa5bd8b3a

Cy:lent Pursuit Threat Hunt: 6-Wk Assessment

Ascent Global, Inc.

Ascent’s intel-based approach to cybersecurity threat hunting helps identify threat actors faster and more accurately than other, more traditional methodologies.

Ascent’s Cy:lent Pursuit™ cyber threat hunt leverages military-influenced patrol methods to close the gap between security tool scope and unknown cyber threats.

Security incidents and breaches like the Colonial Pipeline attack and the on-premises Exchange breach are inevitable cross-industry events. Corporate cyber threats have moved from “if” to “when?” Businesses realize the need to proactively test and examine their systems to mitigate vulnerability risk and strengthen their posture for the future.

Cy:lent Pursuit™ drives: ■ Decreased adversary dwell time ■ Decreased staff hours on remediation ■ Decreased frequency of malware infections ■ Decreased time to reach containment ■ Improved attack surface hardening ■ Improved exfiltration detection

Deliverables ■ Threat Patrol plan ■ Threat Patrol report ■ Documented threat mitigation recommendations

Workloads Driven for the Microsoft Field ■ E5 ■ ACR ■ AAD ■ MEM ■ Defender ■ Sentinel

Sekilas

https://store-images.s-microsoft.com/image/apps.18088.5c7c2661-3c58-4061-9040-cdd0a4df5c71.2ea6f433-5dd3-4ed7-856a-fcd4d1be3dc5.848894fe-b464-4190-9296-521cf3dea06f