Operationalizing your security processes and controls to maximize your IT security investments

HOW DOES LATUS COLLABORATE?

Having the best security program and technical controls will only take you so far. You must also have the ability to quickly adapt operational competencies to support your security initiatives to maximize your return on investment (ROI). With budgets tight and qualified security resources in short supply, companies are left exposed to operational inefficiencies that lead to underperforming project rollouts and limited risk mitigation.

To help bridge this gap, Latus has created a wide breath of services that support our customers throughout the implementation and operational phases of the IT Security Lifecycle. Our highly customizable services along with our advanced cyber threat platform enable you to COLLABORATE with us as an extension of your team to make every security project a huge success.

COLLABORATE
Co-Sourcing
Managed
Devices
Cyber Threat
Management Services
Incident Response
and Forensics
Thought
Leadership
Project
Governance
Project Management
Program Management
Staffing
Education

CO-SOURCING

Co-sourcing is our new spin on managed security services. The focus of these offering is to help our customers reduce their Mean-Time-To-Detection (MTTD) and Mean Time-To-Response (MTTR) of security events. The difference is in our implementation of the technologies and services that support them.

MANAGED DEVICES

The big dogs of managed services have the smallest portfolio when it comes to managing your security devices. LATUS has the expertise to manage what you have, old or new, and what you’re looking to implement. Let us assess your current security controls and provide recommendations and managed services to help you get the most out of what you already own. With over 14 years of experience, our experts support the wide range of solutions including; FWs, IPS, Proxies, WAFs, Splunk, SIEMs, DLP, NAC, advanced endpoint protection (including Bit9), IAM, and many more.

CYBER THREAT MANAGEMENT

Reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Response (MTTR) for security events is quickly becoming a key performance metric for most CIOs. SIEMs and traditional MSSs have been adopted to help, but more context and faster risk analysis is needed to quickly classify and respond to emerging threats, paving the way for advanced Cyber Threat Management (CTM) programs.

INCIDENT RESPONSE AND FORENSICS

There’s a gap in most service providers offering in IR; Most service providers only log and route events, leaving your team responsible for the heavy lifting of remediation. With LATUS you’ll be fully supported all the way through the IR lifecycle including forensics and breach response.

THOUGHT LEADERSHIP

Do you need security leadership to help you make strategic business decisions? Our Virtual CISO support provides you with the ability to kick-start your Information ecurity Program using our risk-based framework and give you the information you need to make sound security decisions for your business. Companies that typically benefit the most are often missing this level of leadership due to expansive growth,recent mergers & acquisitions, or a recent gap in the organization. Our expertise includes; security solution evaluations (RFPs), assessing the security organizational roles, responsibilities and staffing levels, roadmap development, and board level support for strategic planning.In any case, we can help you do more than just survive, we can help you thrive.

PROJECT GOVERNANCE

Project and program management is an important component of successful implementation and maintenance.

PROJECT MANAGEMENT

Including the successful implementation, deployment and integration of new solutions into your environment with the involvement and handoff to the operations team necessary to maintain it.

PROGRAM MANAGEMENT

Develop the process elements to improve or support a new standard in the management of specific security functions, such as vulnerability management, incident management, configuration management, threat management, etc.

STAFFING

Do you need a resource? Let us help! We consider ourselves a long-term partner who’s actively involved in your operations, continually seeking new and innovative ways to improve service and make your job easier.

We see your business needs as you see them and can source the right people, for projects, for full-time and for specific technology expertise.

EDUCATION

People are constantly at risk from new phishing, malware and social engineering tactics every day. Cyber criminals are finding better ways to hack network databases, extract sensitive information and plunder financial services. Are your employees equipped with the knowledge and reactive habits to deal with the growing trends of phishing and other cyber attacks? We tackle the problem with an assessment of your current level of employee security and policy awareness through a custom tailored survey process and optional Social Engineering testing, plus a targeted security awareness program that is co-developed and aligned to your business.

LET'S COLLABORATE.



Contact Us

    Please prove you are human by selecting the Key.

    InformationSecurity Standards

    ISO-27002, COBIT, NERC/FERC, FISMA, PCI-DSS, HIPAA, Meaningful Use, NIST Cyber Security Framework, SANS Top20 Cyber Security Controls, HITECH, FDA, GLBA, Red Flags, FINRA, SEC, SOX, SSAE16 SOC 2