Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: company announcementssecuritycyber threats
Author: Brian Knudtson
Date: April 28, 2022

Bolster Protection with Managed Security Services

As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

11:11 Systems has a long and successful record of helping customers protect their data through Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). We also now have the ability to help customers not only recover their data after a security incident, but also to provide services so customers can defend against those attacks. We’ve been big fans of the NIST Cybersecurity Framework for a long time, and are truly excited to be able to bring solutions to customers and partners so that they can complete the circle of protecting their data.

There are four managed security services 11:11 Systems provides, all of which are mature, proven solutions built on the strengths of excellent partners like Fortinet and Coda Intelligence.

 

Continuous Risk Scanning (CRS)

To start defending data, customers need to first identify where the vulnerabilities in the environment are and the relative risk to critical data. To do this we’ve partnered with Coda Intelligence to create a service that can scan customer environments both internally and externally to track vulnerabilities. The 11:11 Systems Security Operations Center (SOC) works with every new customer to identify and prioritize their systems based on how accessible they are, how critical they are to the business, and how they interact with each other. Then, initial scans are conducted and used to establish a baseline of the risk that each system presents in their environment. 

Reports can then be run to identify vulnerabilities based on the context of the customer’s environment, rather than an arbitrary ranking based on the generic Common Vulnerabilities and Exposure (CVE) score. This context also utilizes cybersecurity intelligence that tracks which vulnerabilities are being exploited in the wild. This focus on risk instead of just vulnerabilities results in customers receiving a report that will maximize their limited time to patch without worrying about the thousands of vulnerabilities discovered each year that go unexploited.

Security is an ever evolving landscape, so scans of the customer’s environment occur on a regular basis, providing continuous updates on the risk of their environment as new vulnerabilities are discovered, new systems are brought online, and new exploits are released. These scans can be conducted remotely for an external perspective and/or internally to give customers an understanding of their risk if malicious activity starts inside the protected network. The 11:11 SOC is there to help provide regular analysis of these reports and alerts, and to provide recommendations to further improve the customer’s security posture.

 

Managed Firewall

In order to fully protect an environment, the movement of data in and out of the network needs to be properly monitored and secured. To do this, we have partnered with Fortinet to utilize their FortiGate next-generation firewall, which provides advanced threat protection that goes beyond searching for signatures to also look for behaviors that may indicate suspicious activity. Some of these threats include: 

  • Network-based malware
  • Intrusion detection
  • End-user based attacks

Once detected, all of the associated traffic can be blocked to reduce or eliminate the impact of the incident. This intelligent detection and protection can be communicated across a distributed network of FortiGate devices. This helps ensure similar activity in other locations can be detected and stopped. Additionally, traffic flow between sites and the internet can be monitored and adjusted to optimize network performance.

All of this is completely managed by the 11:11 SOC in consultation with the customer. Customers have full visibility into how data is being handled, but don’t need to worry about maintaining the firewalls or the rules that manage data flow. Regular reports are generated and analyzed by the 11:11 SOC and are then provided to the customer with recommendations for any adjustments.

 

Managed Security Information and Event Management (SIEM)

Being able to detect an active threat in the environment requires the analysis of an extraordinary amount of data. Because we’re leveraging Fortinet’s FortiSIEM solutions, we can help customers detect threats from across the infrastructure by cross-referencing events on disparate systems that would never be identified by manual means.

At its most basic level, a SIEM is a centralized logging system, but the addition of automated analysis across all the systems makes it possible to identify threats and creates contextual and actionable alerts that cut down on the noise usually associated with monitoring systems. Storing all logs in a single unified location also eases the burden of incident analysis after a security event and can help with many compliance requirements.

The 11:11 SOC will monitor these alerts and help customers identify what is worth reacting to and how best to react. They will then follow up to tune the system to reduce the noise of unimportant alerts and ensure customers see only the alerts they want to see at the time and place they want to see them.

 

Managed Endpoint Detect and Response (EDR)

Time is the most critical asset when it is time to respond to a security threat. The best place to enact this response is in the place where users and data live. To do this, we again partnered with Fortinet to utilize their FortiEDR product, which provides agent-based visibility and analysis on customer’s endpoints, while maintaining centralized control and threat intelligence updates.

The agent has a constantly updated engine that uses both signatures and behavioral analysis to detect malicious activity and immediately react by blocking process execution or placing systems into quarantine when necessary. A wide compatibility with the agent covers laptops, desktops, mobile devices, and servers in order to cut down on reaction time as much as possible.

Every new customer starts in “observation-only” mode to establish a baseline for typical user behavior. Based on this baseline, the 11:11 SOC will work with the customer to define rules based on general best practices and the customer’s specific needs before turning the agents fully on. Centralized reporting will then be available and used by the 11:11 SOC to analyze trends and highlight observed risks to the customer.

 

Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS)

Sometimes all the best defenses will fail, at which point every customer will need to recover either individual pieces of data or the entire environment. Partnering with companies like Veeam and Zerto, has allowed 11:11 to provide services like 11:11 Standard or Advanced Cloud Backup and 11:11 DRaaS for years, and have consistently given customers award-winning “last line of defense” capabilities for protecting their data.

 

There are no guarantees in life or in IT, but with multiple layers of defense that include advanced technology and an experienced security operations team, customers can be assured their data is well taken care of. The purpose of the NIST Cybersecurity Framework was to help organizations ensure they had the proper tools in place to identify risks, protect from threats, detect attacks, respond to malicious activities, and recover from contamination within their environment. By combining managed security services, cloud backup, and cloud recovery under one banner 11:11 Systems can help customers of all sizes to achieve enterprise-level protect of their data across all of these stages of data security.

Categories: Company Announcements, Cybercrime, Ransomware, SecurityBy Brian KnudtsonApril 28, 2022
Tags: company announcementssecuritycyber threats

Author: Brian Knudtson

In his 20-year career, Brian has experienced many different perspectives of the IT industry. He has worked as a value-added reseller, vendor and service provider in roles in web development, system administration, post-sales deployment, pre-sales architecting, public cloud design and technical marketing. Currently, Brian is the Director of Cloud Market Intelligence at 11:11. He enjoys spending time with his wife and three kids. He is also heavily involved with the Destination Imagination program and has been a long-time member of the VMware community, notably starting the Omaha VMUG and putting on VMunderground at VMworld. You can find him online occasionally blogging at http://knudt.net/vblog and tweeting at @bknudtson.

Post navigation

PreviousPrevious post:Closing the GapNextNext post:Ready or Not, Cybercrime is on the Rise. Wouldn’t You Rather Be Ready?

Related Posts

Security
You Can’t Win: Learning to Live with Security Pessimism
March 13, 2023
Building a Championship-Caliber Data Security Strategy
February 15, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
What is 11:11 Systems?
What is 11:11 Systems? A company built on cloud, connectivity, and security
January 30, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}