My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Critical Insight, Inc. 5/2/2023
>
Contracts
>
Agreement
>
Other Procurement Agreements
>
Critical Insight, Inc. 5/2/2023
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/14/2024 3:44:46 PM
Creation date
6/2/2023 11:56:10 AM
Metadata
Fields
Template:
Contracts
Contractor's Name
Critical Insight, Inc.
Approval Date
5/2/2023
Council Approval Date
1/1/1999
End Date
5/17/2030
Department
Information Technology
Department Project Manager
Steven Hellyer and Kevin Walser
Subject / Project Title
Managed Detection and Response Services
Tracking Number
CB 2023-056 MDR Services
Total Compensation
$1,087,010.00
Contract Type
Agreement
Contract Subtype
Other Procurement Agreements
Retention Period
6 Years Then Destroy
Imported from EPIC
Yes
Document Relationships
Critical Insight, Inc. 3/14/2024 Amendment 1
(Contract)
Path:
\Documents\City Clerk\Contracts\Agreement\Other Procurement Agreements
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
17
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />Critical Insight® and the Critical Insight logo are the trademarks of Critical Insight, Inc. <br />©2023 Critical Insight, Inc. All rights reserved. <br />5 <br /> <br />MONTHLY ACTIVITY UPDATES: <br />• PUBLISHED MONTHLY <br />• SECURITY INFORMATION RELEVENT TO THE ENVIRONMENT <br />• INVESTIGATIONS COMPLETED <br />• HIGH PRIORITY INVESTIGATIONS PERFORMED <br /> <br />CONTINUOUS <br />VULNERABILITY <br />IDENTIFICATION <br />(CI-CVI) <br />• AUTOMATICALLY CONDUCTS INTERNAL NETWORK VULNERABILITY <br />SCANS AT CUSTOMER-DEFINED FREQUENCIES AND IP SCOPES(S) <br />• IDENTIFIES INSECURE CONFIGURATIONS, OPEN PORTS AND SERVICES, <br />VULNERABLE SOFTWARE/SERVICE VERSIONS, AND MISSING PATCHES <br />• GENERATES REPORTS WITH STEPS TO ELIMINATE EACH VULNERABILITY, <br />AS WELL AS RISK VIA CVSS SCORES TO ALLOW PRIORITIZATION OF <br />REMEDIATION EFFORTS <br />• POPULATES A WEB DASHBOARD TO VIEW STATISTICS, VISUALIZATIONS, <br />AND RESULTS <br />• TABULAR RESULTS <br />• GRAPHICAL REPRESENTATION OF TIME-BASED TRENDS FOR NEWLY <br />IDENTIFIED VULNERABILITIES AND FOR REMEDIATED <br />VULNERABILITIES <br />LOG RETENTION <br />(CI-LR) <br />• CI SAVES LOGS AS INDICATED BY CUSTOMER <br />• CI HASHES AND ENCRYPTS LOGS TO ENABLE CUSTOMER TO VERIFY <br />THAT THEY ARE SECURE AND UNCHANGED <br />• CI WILL GATHER AND RETURN LOGS ACCORDING TO SEARCH CRITERIA <br />(LIMITED TO SOURCE AND DATE) SPECIFIED BY CUSTOMER, WHEN <br />REQUESTED <br /> <br />INCIDENT CLASSIFICATION FOR CRITICAL INSIGHT MDR <br /> <br />INCIDENT <br />SEVERITY <br /> <br />DESCRIPTION <br />URGENT <br />AN URGENT PRIORITY SECURITY INCIDENT IS A NETWORK EVENT OR SET OF NETWORK <br />EVENTS THAT IS BELIEVED TO PRESENT A SERIOUS AND IMMEDIATE RISK TO THE CUSTOMER’S <br />NETWORK ENVIRONMENT. CI WILL CONTACT THE CUSTOMER (CONTACT ON FILE) VIA PHONE <br />AND EMAIL TO ATTEMPT RESOLUTION. EXAMPLES OF URGENT PRIORITY SECURITY INCIDENTS <br />INCLUDE: <br />• SUSPECTED ACCOUNT COMPROMISE WITH ACCOUNT MISUSE OBSERVED <br />• CUSTOMER SECURITY DEVICE HAS ALERTED CI TO A LIKELY COMPROMISE THAT HAS <br />BEEN VERIFIED USING OTHER MDR DATA/TOOLS WITH NO EVIDENCE THE SECURITY <br />DEVICE HAS MITIGATED THE INCIDENT <br />• SUSPECTED MALWARE INFECTION WITH EVIDENCE OF IMMEDIATE BUSINESS IMPACT <br />• COMMUNICATIONS OBSERVED WITH A SUSPECTED MALICIOUS HOST WITH EVIDENCE OF <br />DATA EXFILTRATION OR IMMEDIATE BUSINESS IMPACT <br />REGULATED DATA SEEN UNENCRYPTED GOING TO AN EXTERNAL DESTINATION
The URL can be used to link to this page
Your browser does not support the video tag.