DEFENSE & SECURITY

MANAGED SECURITY SERVICES (MSS)

TEMPEST HAS INTELLIGENCE, TECHNOLOGIES AND HIGHLY QUALIFIED PROFESSIONALS TO SUPPORT YOUR COMPANY WITH ONGOING PROJECTS.

Device Management

ADS

We administer and manage your company’s security controls, changing policies, settings and rules. We do it remotely or on-site.

Superior Technician in IS Technologies

We offer an activity aimed at reactively handling incidents that make a computing environment unavailable or partially compromised.

ON-SITE TEAM

On-site team

We allocate a professional security team from Tempest to work within the contractor’s premises, on an exclusive dedication basis.

Security Monitoring

Intelligence Driven SOC

A SOC that performs detailed studies on advanced threats from their context – all aligned with the risk map and threat scenarios that are really relevant to your business. It integrates data from different sources (cloud IaaS/SaaS and on-premise) to automate enrichment, triage, analysis and response steps, providing agility to deal with attacks.

Threat Intelligence

Asset Recovery

We bring the solution that recovers assets of interest to your company, in the form of accounts, access credentials, bank cards and payment slips. How? Through technical deepening on fraudulent websites, forums and databases used for malicious purposes.

CTI Strategic Reports

CTI Strategic Reports brings together content on cybersecurity, available on a single, exclusive and easily accessible platform. There are 3 reports containing the main global updates to guide your team and organization against cyber threats.

Research and Deepening

Do you need to focus on investigations of critical threats that could compromise your company’s security? We have a team of security engineers and experts in digital fraud to carry out an in-depth technical analysis in the event of an attack.

Monitoring

The objective of this activity is to provide an overview of the digital threat scenario, with information on the operation of groups of fraudsters specialized in the banking market, identification of the contractor’s data posting in information dumps, in addition to, when possible, notification quick insight into planning and executing attacks on the contractor.

VIP Monitoring

The objective of this activity is to provide an overview of the scenario of digital threats to which a person is subject, identifying through information from groups of fraudsters the misuse of the individual’s data to generate fraud.

Takedown

TakeDown is the process in which a service or website is removed or withdrawn from operation in order to overthrow a fraudulent action.

Intel Feeds

Tempest Intel Feeds are Cyber Threat Intelligence feeds that provide Indicators of Compromise (IOCs) data to be consumed automatically by the customer for use in their security assets and in various layers of defense.

Vulnerability Management

Vulnerability Management and Compliance Management

Proactively manage and prioritize risks with a focus on remediation, before the threat is exploited. Tempest’s GVGC offer has consistent processes, within the context of the client’s business and with intelligence in risk prioritization, in addition to providing actionable metrics.