Copyright 2015-2019 - Coordinates

PLATFORM OVERVIEW

cor. is an integrated stack of advanced security solutions that enable the effective delivery of continuous Cybersecurity Managed Detection & Response services for Enterprises.

cor. Technology Stack

The platform integrates within the enterprise environment, enabling the delivery of advanced cybersecurity services across detection, prevention preemption, and response.
Overlaid by Coordinates continuous monitoring services (Security Operation Center),  our platform offers an industry-leading approach to defend against cyber threats through automation and orchestration of detection and response.

cor. Features & Capabilities

Advanced SIEM Technology

Security Automation and Orchestration

Data Residency

Vulnerability Assessment Management

Log Monitoring and Retention

24x7x365 Service Level Agreement

Incident Response and Containment

Proactive Threat Hunting

Tailored Threat Intelligence

Reporting & Dashboard

DATA RESIDENCY

cor. technology stack is engineered to take into consideration heightening requirements for data residency.


cor. platform collects, normalizes, stores & correlates within the client environment in full compliance to the client own security policies.
Client Data never leaves the client premise.

TAILORED COMMUNICATIONS

We manage all client communications through a highly secure and customizable ticketing system - tailored to suit client-specific communication and escalation requirements.
24x7 access to our Cybersecurity analysts through multiple channels: Chat, Ticket, Email and Phone.

​Enterprise Dashboard and Reporting repository capabilities are integrated into cor. platform; This will ensure secure client access to their information and consistent compliance and respect to Data Residency across all the services life cycle.

MULTILAYER CORRELATION

At the core of our Cybersecurity Technology & Service delivery is our overarching architecture of Orchestration and Automation.
Our  Orchestration and Automation layer allows our Incident Response teams to trigger advanced analytics and correlation playbooks to significantly reduce the time to triage and respond to validated threats.
Our Orchestration and Automation layer enables pervasive correlation of events across all elements and log sources;  it enriches our analysts' capabilities by instantly identifying threats across the enterprise environment with the exact context for an effective response.
those capabilities not only dramatically reduce false-positives incidents and time to remediate but enables our team to automate tactical response to detected threats.

PROACTIVE THREAT HUNTING

Advanced threat behaviors and targeted tactics may elude even the most advanced and automated security systems.
Armed with automated threat detection and analytics technology, curated threat intelligence, and proactive threat hunting methodology, our specialized security analysts, perform deep inspection of the enterprise environment to identify Indicators of Compromise (IOCs), undetected vulnerabilities, suspicious insider behavior and other malicious activity on your network.
Our Proactive Threat Hunting identifies gaps in enterprise security architecture and detects threats that typically evade traditional security controls.

CURATED THREAT INTELLIGENCE

Our platform incorporates Advanced Threat Intelligence subscription.
Our team curates and tailors the threat feeds to the enterprise-specific environment, industry, geography, threat actors among other factors.

Threat Intelligence from more than fifty different sources of threat feeds is regularly curated and automatically deployed into the cor. platform.
This critical process enriches the enterprise environment to enable actionable intelligence and augment our Incident Response team with the proper tools to effectively and timely defend from imminent threats.

DOWNLOAD

COR.DATASHEET

8500%

Attacks involving cryptojacking increased by 8,500 percent in 2017.

90%

of all email is spam and viruses

88%

Clicking links within email accounted for 88% of all reported phishing

130

There are over 130 large-scale, targeted breaches in the U.S. per year, and that number is growing by 27% per year

$2.4M

The average cost of a malware attack on a company is $2.4 million

$5.0B

Ransomware damage costs exceed $5 billion in 2017, 15 times the cost in 2015.