How does MSS work?

CIS offers MSS for devices including, but not limited to, IDS/IPS, firewalls, switches & routers, servers, endpoints, and web proxies.

  1. A Log Collection Platform is established.

  2. Accenture receives all logs and provides an initial, automated review.

  3. CIS then receives the logs using a secure transmission, and they are analyzed by expert analysts using cyber threat intelligence specifically focused on SLTTs.

  4. Events are analyzed and verified as legitimate or false positives.

  5. If an event requires escalation, an alert is sent to the organization in accordance with pre-established escalation procedures if necessary.

  6. Monthly reporting provided of all activity.