Howard County Government
Customer
Comtech addressed Howard County Government’s needs by supporting a Managed Security Service (Cybersecurity Operations Center) which provides around-the-clock security monitoring which is powered by big data analytics. This equips Howard County with strategic insight needed to prioritize and respond to critical incidents as well as build the strategies that protect the organization’s assets, reputation, and viability.
Customer Solution
Cybersecurity threats are agile, advanced, and ever changing. To address such a difficult subject, organizations must stay proficient and ahead of the latest attack campaigns, 0-day attacks, as well as stay effective in response and remediation.
Comtech recognized the need for:
- Real time threat monitoring
- Review of multiple platforms for security incidents
- Efficiency in detection and response
- Identification of existing gaps in controls for a proactive security posture
Comtech’s delivery of supporting a Cybersecurity Operations Center involved a designated team which learned Howard County’s network, environment, business goals and processes, leading to focusing on the issues most important to them. Each SOC has multiple secure links to data centers located in North America. Should any SOC experience an issue that may impact delivery of services, operations are immediately failed over to another online SOC. In the event of prolonged closure of an SOC, disaster recover plans are implemented so that staff of SOC can be relocated to a backup location so that operations can be restored. Our delivery strengthened Howard County’s security profile by understanding threat patterns, trends, and supporting in security process planning.
The SOC can be relied on for:
- Identifying malicious activity and threat actors
- Custom detection
- Implementation of organization specific threats
- Endpoint Detection and Response
- Health Monitoring
- Cloud defense
Our solution provided Howard County with reduced operational costs, extension of their security team, accelerated detection and response, managed reporting on compliance, and retention of security logs and monitor devices.