Why CSC RDR
Is not enough
Traditional approaches to protecting against malware use known threats' signatures to protect your systems. That is no longer enough since new malware is produced every second, and unknown viruses and trojans are attacking companies. Once an attack is launched, the goal is to break through every defense barrier. IBM Q-radar NanoOS works underneath your operation system and is invisible to malware.
Basic security settings protection
Built-in protection against malicious code
Third-party antivirus provides additional protection
IBM Q-radar EDR
When all other protections fail, CSC RDR takes over
Security is completely lacking if malicious code gets through
How?. NanoOS uses "behavior analysis."
When all other protections fail, RDR stops the process causing damage.
What is CSC RDR
Behavior analytic XDR
IBM Q-radar EDR/XDR SOC system powered by Ai
Global leader and financed by the European Union
CSC RDR SOC running form of our cloud-based in Sweden
AIOps, intelligent automation, machine learning
Unique service together with IBM
Price model and flexible agreement for small and medium-sized companies
Best in class
Ranked as the best solution for endpoint security 2020,2021 & 2022
Price: SEK 330 / month
Subscription: 3 months in advance/ongoing
The consultant signing agreement with TTIA AB
Contract company admin costs: SEK 995 / year
The consultant receives a monthly report
The contract company gets a weekly report
Features see: "C level."
Visually prove your company meets security requirements,
By connecting to CSC RDR, your company or organization comply with this.
Price: SEK 2900 / month
Subscription 3 months in advance
Units: 10 (extra unit SEK 150 / month)
Reports: Weekly reports
Start-up cost: SEK 5000 / one time
The start-up cost includes reducing of false positives & alert fatigue.
All programs are running in your IT environment today—continual learning and improvement (3-month SOC service).
Automated AI systems for monitoring and analysis.
Manages real-time security breaches, threats, and weird activities across your IT infrastructure.
Undetectable by design NanoOS, a unique hypervisor-based approach, works outside the operating system, providing deep visibility into processes and applications running on endpoints.
Near real-time response. EDR/XDR
Add on: (extended SOC service)
Tailor-made threat-hunting Custom detection strategies — beyond “out of the box” models — help address compliance or company-specific requirements without rebooting the endpoint.
Automated, AI-powered threat detection and threat hunting include telemetry from indicators that can be customized for proprietary detection and granular search.
Guided and autonomous remediation can simplify and speed response, freeing analysts’ time.