The advantage of working with ParaFlare was the depth of knowledge and experience. Their service was not transactional. It was a real partnership.
From the Company CISO
Company & Project
They are an Australian headquartered minerals and metals company that owns and operates a portfolio of world-class base metal mining operations, development projects and exploration fields across Australia, Asia, Africa, and America regions.
Business services & technology is accountable for the underlying technology services that underpins their business operations. These technology systems and services enable them to achieve its objectives of providing world-class base metal mining operations, development projects services and exploration fields.
These services include ongoing development and support of the business applications that support the business processes around the front-end mining operations and back office functions.
Our client needed support to detect and respond to cyber breaches quickly and effectively, and manage issues arising once a breach did occur. The ParaFlare team deployed and tuned a Security information event management (SIEM) solution, normalised log sources from multiple complex products, and created custom detection rules.
The ParaFlare team deployed and tuned a Security information event management (SIEM) solution, normalised log sources from multiple complex products, and created custom detection rules.
“We also undertook threat hunting activities to discover incidents based on our knowledge of likely Advanced Persistent Threat (APT) tradecraft, leveraging global data,” said Frank Santucci, Chief Technology Officer.
Requirements & Outcomes
A CRITICAL REQUIREMENT WAS COMPREHENSIVE SECURITY SERVICE MANAGEMENT AND CONTINUOUS THREAT AND BREACH MONITORING.
The outcome for our client was increasing visibility of threats and advanced attacks, reducing dwell time of malicious hackers, and 24/7 cyber operations support. Detect and respond to cyber breaches as well as effectively manage any breach which might occur. Including:
- Reduce RISKS associated with its Information Technology services.
- Better support our client’s future business model through enhanced ICT security.
- Continuous monitoring, event detection and management and threat intelligence services.
- Provide an objective and independent perspective on the client’s security posture to help and maintain a system of checks and balances with in-house personnel.
- Assist them with identification and development of use cases specific to their environment.
In addition, address the existing operational risk associated with the current SIEM and Security Operations capabilities.
Targeted Managed Detection And Response
Our end to end approach allowed the client to rapidly transform their security posture to one of RESILIENCE through delivering the following:
- A 24/7 team, that delivered endpoint, network monitoring and SIEM analytics.
- Visibility of not just Cyber Events but unusual user activity
- Advanced endpoint process capture and threat detection solutions, driven by the security industry’s best threat.
- Rapidly reduced malicious actor system dwell time.
- Cyber Threat Hunter teams, who proactively looked for new and emerging threats.
- A dedicated Cyber Incident Response Team that was able to respond quickly when an advanced threat was found to have penetrated the network