

DataShield MSS addresses the three main challenges municipalities face today in their pursuit to build and manage cybersecurity programs: staffing, services, and costs. DataShield Government provides a comprehensive 24x7x365 cybersecurity program at one-sixth of the cost of building a comprehensive program in-house.
DataShield provides the following to ensure all cybersecurity bases are covered for your municipality:
DataShield establishes a symmetrical relationship between the municipal customer and the DataShield SOC to enable joint and rapid analysis and decision making to proactively address and mitigate the municipality’s threat landscape. In other words, the customer sees exactly what the DataShield SOC operators sees and partners with the municipality’s IT operations to execute threat mitigation actions. The municipality does not have to worry about conducting these actions independently. The DataShield SOC team integrates directly into the municipality’s IT team and essentially becomes a direct part of the municipality’s IT infrastructure operations and management. This enables the municipality to focus mainly on governance and control of the cybersecurity program while the DataShield security team focuses on implementing and managing daily cybersecurity operations. DataShield provides proactive mitigation of cyberthreats to the municipality as they occur. DataShield can help municipalities address compliance requirements, mitigate the high cybersecurity staffing turnover, and quickly implement threat mitigation operations to significantly and rapidly raise its security posture.
DataShield® Essential Features
Essentials includes DataShield Analytics Security Command Center and Incident Management Modules. Cybersecurity operators will be able to view the same cybersecurity telemetry as DataShield MSS cybersecurity operators, enabling full symmetrical communication and decision making between the customer and DataShield MSS security operators.
Disruption and containment of threats in real-time with managed threat mitigation from basic actions such as disabling ports and accounts to full scale and comprehensive cyberattack mitigation against nation state level actors.
24x7x365 DataShield Security Operator monitoring of security events and alerts on the customer's IT infrastructure supported by AI to automate event and alerts triage. Data Defenders recognizes the need for the human equation in threat mitigation. As such, our experts are always available to monitor and respond to events across your infrastructure.
Aligned Threat Intelligence which tracks more than 40 nation state actors and over 140 threat actor groups across both the internet and dark net. Data Defenders reviews both individual and correlated alerts, incidents, and problems across the customer infrastructure to identity indicators of true positive activities.
Attacker containment and recovery when attacks occur. Assistance in recovery and remediation of critical infrastructure from a security incident. Investigate, triage, and resolve incidents. Escalate through SOC L1/L2/L3 based on event complexity and priority.
Detailed incident investigations to determine source, impact, and attack vector of various activities fully executed through resolution, after-action reporting, forensic evaluation, and law enforcement engagement, as required.
Continuous evaluation of data sources and ingestion methods to ensure the correct signals are always being incorporated into the overall DataShield threat view.
Human-led threat hunting takes Data Defenders' Threat Intelligence to the next level by including digital forensics, log analysis, and malware analysis support. Maintains the security assurances and actively defends systems as live adversaries attack it. Human-led threat hunting takes a deeper look into system and network activities to expose advanced threats and identify the scope and impact of malicious activity associated with human adversaries or hands-on-keyboard attacks.
Leveraging artificial intelligence, machine learning, and human expertise, Data Defenders' intelligent Anomaly Detection identifies high risk combing across various low fidelity exhaust. Scalable hunts using detection and correlation engineering platform. Hunting across endpoints, identities, cloud apps, email, and data.
Crisis management including the orchestration of incident response by bringing in the right talent across security and the IT technology stack.
Data Defenders will constantly leverage our understanding of your infrastructure and organizational goals to provide guidance and best practice to build and maintain a well-architected infrastructure of services, data, end user training, and associated policy controls.
To enable your security posture, Data Defenders starts with a full security scan of your environment with specialized proprietary tools. Clear recommendations for remediation and eviction actions. Further, Data Defenders will support the standup of all enabling technologies including network devices and controls, Azure Sentinel, Log Analytics, SysLog Sources, Defender for Endpoints, Office 365, AD & AAD Identity, Defender for Cloud, AAD P2 (for Identity Protection signals), Azure and M365 Purview, Defender for Cloud Apps, and Defender for IoT. Support may include on-premise infrastructure and both commercial and sovereign government cloud elements spanning multiple SaaS solutions.
Guidance, technical support, and best practice as you continue to grow your cloud based IT capabilities through various cloud and hybrid technologies.
Establishment of policies, initiatives, blueprints, configurations, and identity management to enhance command and control of your infrastructure aligned to and exceeding relevant regulatory standards.
Single point of contacts for all aspects of DataShield and Cybersecurity Lifecycle Management. Assessing your risk posture, defining control objectives, and identifying areas for improvement. Recommending security controls and formulating a roadmap that is designed to meet your risk control and management objectives. Guidance through threat modeling exercises, evolving use cases, and continuous improvement of your security posture. Partnership for long-term modernization.
Comprehensive dashboard aligned to continuous improvement activities based on measured KPIs and orchestrated resources which drive partnership across your teams for long-term and continuous improvement of the service and your overall security posture. Interactive reports demonstrating progress aligned to investigated, adversary tactics according to the MITRE framework, and threat categorization based on behavior, characteristics, and impact. Triage and resolution under mutually agreed SLAs thus reducing time to acknowledge an alert to address and remediate against a discovered adversary to mitigate their opportunity time to conduct and attack and manipulate sensitive systems, data, or services.