Frequently asked questions

Foxtrot Technologies provides a range of managed cybersecurity services services including IT security monitoring, vulnerability detection, and penetration testing.

These services are delivered through our flagship products: FoxTech DEFEND, ASSURE, and VERIFY, each designed to address specific security needs from detecting and responding to threats, through rapid vulnerability detection and in-depth penetration testing.

These are all delivered from the cloud, by our security specialists so you don’t need to deploy complex software, or need security expertise in-house.

Rapid incident response is crucial in cybersecurity as it helps contain intrusions before the damage escalates out of control.

This service includes immediate action to contain and eliminate threats, minimising downtime and potential loss. Quick recovery processes and forensic analysis ensure that your organisation can return to normal operations swiftly while preventing future incidents.

FoxTech stands out because of its dedicated and skilled cybersecurity consultants who provide personalized services and support. Unlike purely tool-based solutions, FoxTech combines state-of-the-art technology with human expertise to deliver exceptional security outcomes.

DEFEND

FoxTech DEFEND is a comprehensive Security Operations Centre (SOC) that includes cloud security monitoring, host intrusion detection, network flow monitoring, cyber threat intelligence, forensic log storage, rapid incident response, and a Security Information and Event Management (SIEM) system.

This is all provided as a managed service, combined with our security experts to triage alerts, contain attacks and advise what this means for your business.

Further Reading: FoxTech DEFEND

Rapid incident response is crucial in cybersecurity as it helps contain intrusions before the damage escalates out of control.

This service includes immediate action to contain and eliminate threats, minimizing downtime and potential loss.

Quick recovery processes and forensic analysis ensure that your organisation can return to normal operations swiftly while preventing future incidents.

Further Reading: Rapid Incident Response

Forensic log storage is essential for maintaining comprehensive records of security events. We use these to trace the origins of security incidents and we can provide these to you for your own incident investigations.

Your logs are safely stored in our cloud-based SIEM, ensuring compliance with regulatory standards and safely out of reach of insiders and attackers alike.

Further Reading: Forensic Log Storage

Network flow monitoring provides visibility into the traffic patterns and data flows within your network.

By analyzing these flows, Foxtrot Technologies can detect unusual or malicious activity, ensuring the integrity of your network.

This proactive monitoring helps in identifying potential threats before they can cause harm.

Further Reading: Network Flow Monitoring

Cyber threat intelligence involves the collection and analysis of information about current and emerging threats. This intelligence helps us anticipate and defend against cyber attacks in your IT.

We incorporate intelligence on new vulnerabilities and attacks into our detection rules; and have use data feeds of known attacking IP addresses and domains to detect the presence of known threats in your IT systems.

By keeping abreast of the tactics, techniques and tools used by attackers, we ensure you’r protected against the ever evolving threats.

Further Reading: Cyber Threat Intelligence

Security Information and Event Management (SIEM) is a system that collects, analyzes, and correlates security event data from various sources within your network to provide real-time insights and alerts.

With FoxTech DEFEND, you get a fully integrated SIEM solution as part of the comprehensive SOC services, ensuring enhanced security visibility and incident response capabilities.

Further Reading: FoxTech DEFEND

As a completely cloud based cyber security managed service, there is little that you’ll need to set up yourselves.

For servers and laptops there is a simple agent to install.

For cloud based services (such as Microsoft 365) we can either provide a simple set-up guide, or we can walk you through it on a teams call. Whichever works for you.

ASSURE

FoxTech ASSURE enhances your vulnerability management by providing you with the information on what you need to patch and the risk each vulnerability presents.

It uses a combination of agent-based detection, and automated scanning of your internet attack surface to rapidly detect vulnerabilities.

With vulnerability data all in one place, with simple reports, you are always ready and able to demonstrate how you meet your patching regulatory requirements.

This allows you to have a data driven approach to vulnerability management, patching those things that present the most risk first.

Further Reading: FoxTech ASSURE

 FoxTech’s Vulnerability Scanning process starts with identifying the internet IP addresses and domains that you need testing, and the servers that will be monitored via the agent.

Once agreed, our cloud-based scanners will run regular automated scans of your internet attack surface for known vulnerabilities. Our agent will collect software inventory and configuration settings from your servers and compare these to vulnerability databases and security configuration benchmarks to detect known vulnerabilities and configuration weaknesses.

Further Reading: Vulnerability Scanning

FoxTech ASSURE is designed to seamlessly integrate with your existing security tools, enhancing your overall security management framework.

It works alongside other security solutions to provide continuous monitoring, real-time alerts, and comprehensive reporting, ensuring a cohesive and robust defense against threats.

Further Reading: FoxTech ASSURE – Integrated

VERIFY

FoxTech VERIFY offers a variety of penetration testing services including external and internal penetration tests, cloud security assessments, and web application security testing.

Our pen testers use a wide-variety of tools and techniques to identify configuration errors, coding flaws, and vulnerable software that could be exploited by attackers to gain access to your systems.

Reported in straightforward language, with pragmatic remediation advice you’ll be well equipped to address these issues.

Further Reading: FoxTech VERIFY

A cloud security assessment involves evaluating the security measures and configurations of your cloud environments.

This assessment identifies misconfigurations, and compliance gaps, providing recommendations to enhance your cloud security posture. It ensures that your cloud services are secure against potential threats.

Further Reading: Cloud Security Assessment