Security Processes

Delivering an end-to-end approach from alarm to remediation

 

Through continuous development, GCI has created an industry-leading Cyber Immune System that is not only built using best-of-breed technologies, managed by industry experts but employs carefully honed, mature security processes to ensure your business is in safe hands, always.

GCI’s Cyber Immune System, underpinned by SIEM (security information and event management) technology, is supported by processes that deliver an end-to-end approach from alarm to remediation. Our 24/7 support and strict Service Level Agreements ensure security incidents are dealt with quickly to reduce ongoing risk to your business. The use of automated tasks, where appropriate, allows us to efficiently manage your organizations security posture so you can focus on your business.

 

Sharpening our Focus on Security Threats

A properly deployed and maintained SIEM Security solution should only generate alarms when there is a genuine risk of a security incident. GCI’s SIEM Engineering team personalise the technology to your landscape to decrease false positives, thus increasing the chances of detecting real threats. Integrated Threat Intelligence ensures emerging threats are detected as fast as possible. The processes that analyse event data within the system automatically create a correctly prioritised ticket in GCI’s Support System to ensure our team can prioritise immediate threats.


"With proactive focus and 24/7 industry-first, risk categorisation based on intent, we provide priority focus when you need it most”. GCI’s Head of Security, Craig Stirling.


GCI’s Managed Security Services are also process driven and delivered through the scheduling and completion of service tasks. These proactive tasks, termed Watchpoints, are scheduled into our IT Service Management platform, ServiceNow. Once completed, this information can be used for audit purposes, proving that recurring measures have been taken to maintain an excellent security posture.

 

What would you do in the event of a data breach?

When most organizations are hit with a security breach, they have little or no process to ensure that the breach is contained and remediated. Even fewer are aware of their requirements to report a breach to the relevant authorities, or what information they need to provide as part of that report. GCI’s Security Incident Response Team (SIRT) are available 24/7 and follow a set procedure to ensure your business is back on its feet as quickly as possible, with the breach sealed and the appropriate information reported to the ICO.

Just some of our Security & Compliance clients

Aggreko
Animal Friends Pet Insurance
Carnival
Churchill Retirement
Dimensions
Fat Face
Gas Safe Logo
Halliwell Jones
Hutchesons Grammar School
loreal
Mulberry
SAS International
Scope Logo
TEPE
The Duke of Edinburgh's International Award Foundation

CASE STUDIES, BLOGS AND EVENTS 

Contact us to see what we can do for you

By submitting this form you agree to our GDPR Marketing Privacy notice. You have the ability to opt out at your discretion.