Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Non-existent or decentralized IT incidents' management
No automated business processes
Risk of attacks by hackers
Risk of lost access to data and IT systems
Insufficient risk management
Values
Ensure Security and Business Continuity
Ensure Compliance
Manage Risks
DXC Security Platform
DXC Technology's platform helps enterprises implement effective cyber defense responses and visualize network health
Description
- Correlation of information on incidents and vulnerabilities to the configuration management database (CMDB) to understand the business criticality, allowing incident responders to work on the most important issues first
- Workflows that follow National Institute of Standards and Technology best practices for computer/IT security incident handling (NIST SP 800-61r2)
- Automated post-incident review report that eliminates the need for manual post-mortem reports
- Automatic triggering of a patching process, configuration changes or other standard workflows, by specific types of security incidents and vulnerabilities
- At-a-glance dashboards that show executives and analysts the exact status of their overall security posture as well as enable drill-down to a specific incident
- Indicators of compromise automatically linked with security incidents and vulnerabilities, streamlining and automating the manual process of threat investigation and incident triage
- Chat capabilities
- Content and knowledge management
- Task management
Through increased automation and improved collaboration, security and IT teams can work more closely to hold the entire organization accountable for solving issues quickly. These streamlined processes can help expand the capacity of security analysts and response teams to respond more efficiently to attacks and incidents. As a result, the DXC Security Platform will help reduce overall risks enterprise-wide.
Comprehensive support services
DXC offers a complete array of managed security services for cloud, traditional data center, endpoint, identity and network management. DXC’s Security Platform can be integrated with DXC’s services:- 24x7 SOCs for continuous monitoring and management of incidents and vulnerabilities
- Cyber assurance for account and security service management
- Incident management team for response to user- and machine generated incidents
- Managed SIEM
- Managed vulnerability assessment
- Global threat intelligence
- Client ITSM environments, if needed (at additional cost for integration)
- Service Desk, if needed (at additional cost)
Why DXC?
With 40 years of experience in information security, DXC is one of the world’s few companies that provide end-to-end services to monitor and safeguard systems — from strategic consulting and technical assessments to managed security services.Key features:
Security Services Catalog and User Ticketing. Allows security teams to manage and respond to user-generated security incidents. Handles incidents raised by users over the telephone, email or the security catalog. Integrates with threat intelligence portal. Requests automation among IT, end users and security teams
Security Information and Event Management (SIEM) Integration. Allows security teams to test, execute and audit security response plans. Handles network- and non-network-related incidents. Integrates with threat intelligence portal. Requests automation among IT, end users and security team. Predefines workflows for common security incidents
Vulnerability Management. Manages vulnerability investigations and aligns remediation activities. Integrates with the National Vulnerability Database. Includes third-party integration with market-leading vulnerability identification solutions. Seamlessly integrates with incident response tasks, change requests and problem management. Predefines workflows for common security vulnerability types