Vijilan enables IT solution providers and MSP’s (Managed Service Providers) to offer security services to their clients. Our fully staffed Security Operations Center (SOC) consists of both automated and human “eyes-on” scrutiny. It’s this combination of 24/7 threat detection, assessment and response that help client organizations improve their security posture and assist in their compliancy efforts.
Vijilan provides comprehensive cyber-threat monitoring and support services. These services include event log data collection at the customer’s site, automated parsing and correlation in our cloud-based SIEM, skilled human review of potential cyber-threats in our Security Operations Center (SOC), and expert remediation support and guidance from our Incident Response team (IRT). All of these services are available to MSP’s for “white-label” delivery to their clients.
We are located in Coastal Tower in the city of Fort Lauderdale, Florida. We welcome MSP’s to visit our offices and Security Operations Center. We’re a few minutes from the beach so bring your flip-flops!
Vijilan’s 24/7 threat detection, monitoring and response services are available exclusively through Managed Service Providers (MSP’s). If you don’t have a preferred service provider, call us and we can help you find a partner in your area.
A fully staffed Security Operations Center (SOC) is a significant investment. This of course includes facilities, complex threat intelligence experience and technology - but also hiring and retaining multiple teams of highly trained experts who operate around-the-clock. Some enterprises might have the resources to undertake this venture, but small and midsized organizations could be at a security disadvantage due to the expense involved. Vijilan has made this multi-million dollar investment and made it exclusively available to MSP’s like you.
Cybercrime doesn’t sleep! Because of this, PCI DSS, SOX, ISO, NCUA Code of Federal Regulations part 748, FDIC IT Risk Management Program (RMP), GLBA, HIPAA and other compliance programs require log storage, management and monitoring. Vijilan’s services can help your clients protect their data against cyber threats and gain compliancy.
No. Vijilan is an IT security company. While Vijilan has its own Security Operation Center and provides services to MSSP’s and MSP’s, we are not in the business of managed services. MSP’s and MSSP’s can leverage our infrastructure, our technology, and our resources in order to expand their service offerings or meet their client’s requirements.
Yes! ConnectWise MSP partners have seamless integration with Vijilan’s service offerings. If you don’t have a ticketing system, you can use our proprietary and powerful SERIUS platform.
The MSP installs a virtual appliance called a collector at the customer’s site (either on a physical server, VMware ESX, ESXi, Citrix Xen or Microsoft Hyper-V). Devices which will be monitored are then configured to send their log files to the collector (or the collector can proactively “pull” these files). While the installation must be done on-site, the configuration can be done remotely and Vijilan can advise the partner in the event of issues or complexities.
While IT professionals try to stay 3 steps ahead of the bad guys, there are instances where malware or other threats might find their way onto your customer’s network. We are constantly examining log events and looking for suspicious behavior. If any is detected, an expert analysis is conducted by our Incident Response team (IRT). This analysis will result in a ticket or email that includes a description of the threat, specific devices affected and any other information we’ve gathered about the incident. Finally, we supply actionable guidance to contain, eradicate, and recover from the incident. We also supply 24/7 contact information in case the MSP has questions.
Vijilan uses a variety of proprietary and commercial security technologies including multiple, world-class SIEM (Security Information and Event Management) systems that have been enhanced with our own complex correlation rules and processes that have been developed over 15 years. It’s this intelligence (and our human Incident Response team) that makes Vijilan more effective at detecting and analyzing cyber threats than other solutions.
Vijilan can provide configuration guidance and 24/7 monitoring for basic device health, but we do not perform administrative functions on any customer device. If Vijilan is collecting logs from your client’s firewalls, we may be able to identify vulnerabilities and misconfigurations – informing you of necessary changes.
Vijilan collects only log files and device performance data. Our process does not collect network traffic or actual business information (such as emails or documents). For example a log file might indicate that data was sent from a PC, but won’t actually reveal what the data contained.
Our pricing is MSP friendly! Pricing is per monitored device, not by log volume. This means you can assure your customer of a fixed price without monthly fluctuations or the need to perform math formulas to determine Events Per Second (EPS).
While there are many types of resellers, VARs and MSP’s, the ideal partner has the ability to install a virtual appliance at the customer’s physical location, configure servers, firewalls or other infrastructure devices and finally, act on incident tickets to resolve customer issues. These actions might include visiting the customer site, re-imaging, or performing maintenance on various devices. Additionally, a fair understanding of security principles is preferred. If you have customers interested in security services but you don’t possess these capabilities, we may be able to help you partner with another provider in your area.
If you’re selling services today, it’s as simple as bundling Vijilan’s service into your existing offerings. You can also offer these services standalone. Feel free to add your logo and personalize our un-branded marketing materials. We also have customer-facing videos, artwork for trade show banners and generic e-mail templates.
Our cloud-based infrastructure is designed and managed in alignment with security best practices and a variety of IT security standards, including:
In addition, controls employed by our cloud infrastructure provider satisfy requirements for several industry‐specific standards, including HIPAA and Cloud Security Alliance (CSA).