GuidePoint Security showcases vSOC technology at RSA 2017

Forward thinking security professionals recognize that the current progression and magnitude of cyber threats is insurmountable for the understaffed security industry to effectively tackle.

There is, however, a solution.

Join GuidePoint Security for an informative Virtual Security Operations Center (vSOC) presentation at RSA 2017. During the vSOC presentation, you’ll learn about how GuidePoint’s managed security services can assist you with identifying threats and vulnerabilities through detection, response, and recovering from validated incidents.

Presentation Location: CrowdStrike Booth #2345, South Hall
Presentation Days/Times: Tuesday, 12:30 p.m. and Wednesday and Thursday, 11:30 a.m.

GuidePoint Security’s vSOC analysts and incident responders, supported by CrowdStrike Falcon Host, offer best-in-breed endpoint protection. Together, they offer one of the most comprehensive around-the-clock endpoint and security monitoring solutions on the market – all with the efficiency and scalability of cloud-based security management.

GuidePoint’s vSOC ingests Falcon Host platform data into the vSOC Detect monitoring platform, powered by Splunk. By monitoring endpoints and correlating endpoint data against other security-related information, vSOC analysts actively hunt for and discover new and emerging threats.

If you can’t make the presentation in the exhibit hall, our team will offer free, private demonstrations of our vSOC. All you have to do is sign up, and a GuidePoint representative will be in touch to set up a time to meet with you during the RSA Conference. Register now for your exclusive vSOC demo.

Not attending RSA or don’t have time to visit with us? You can register for our webinar, Stay Ahead of Adversaries Using Next-Gen Endpoint Security, on March 9th.

GuidePoint’s Expertise Supports Your Organization’s GSA HACS Contract Needs

Imagine this: Your network is compromised with outbound connections sending data to foreign countries, and your information security team has no idea.

That’s exactly what GuidePoint Security’s analysts and incident responders discovered while actively cyber hunting for a new client in our Virtual Security Operations Center (vSOC).

Our professionals discovered open connections to more than 30 foreign countries, even though the client had no foreign interests or customers. Using Splunk’s Enterprise Security application, our team put its geolocation capabilities to work and created a map to illustrate all the foreign locations that successfully received this data.

When we alerted the client to the connections, we used the map to show the extent of the compromise. The client agreed to implement egress rules on its firewalls to limit destinations for data transfers, as well as country-blocking technologies in its perimeter security appliances to deny connections to foreign countries. By working with GuidePoint, the client narrowed the scope of who has access to its enterprise network and improved its overall security posture.

This real-world example of cyber hunting for data exfiltration is one of the many ways GuidePoint can support your organization with your General Services Administration (GSA) Highly Adaptive Cybersecurity Services (HACS) contract needs.

GSA recently awarded GuidePoint all four HACS Special Items Numbers (SINs), including, 132-45C: Cyber Hunt. The others SINs include: 132-45A: Penetration Testing; 132-45B: Incident Response; and 132-45D: Risk and Vulnerability Assessment.

With these SINs, GuidePoint’s subject matter experts can help your organization with all of your information security needs. As a federal or state/local government client, your organization will have:

  • Access to pool of technically evaluated cybersecurity vendors
  • Rapid ordering and deployment of services
  • Reduction in open market ordering and contract duplication
  • Cybersecurity/acquisition support resources from GSA

For more information about how GuidePoint has helped clients, download the full text of our SINs Use Cases.

For additional information and pricing on our IT professional and cybersecurity services, visit