Managed Detection and Response (MDR)

Managed Detection and Response (MDR)

Our MDR services use next generation threat hunting and detection and response capabilities that extend beyond the endpoint, unifying your network and cloud detection and response capabilities into a single view.

And our 24/7 experts and world class threat intelligence, combined with the automation at the heart of our service mean you can focus on the threats that really matter, while our team of detection and response specialists ensure that you are ready to respond to even the most sophisticated cyber threats.

Access to a dedicated Slack channel, for ease of communication with our team 24/7.

Passionate and dedicated team of cyber experts who have extensive experience in multiple specialisms of cyber security, including managed services, Cloud security, forensic analysis and expertise in automation.

Visibility, compliance and governance automated asset inventory, compliance reporting and data scanning give full multi-cloud visibility.

Network visibility, threat detection, host, serverles and container microsegmentation, combined with next-gen Machine Learning to provide best-in-class security.

Vulnerability management, workload security and automated runtime security all work seamlessly to enforce compute security.

Activity monitoring, user and entity behaviour analytics and IAM governance provides sophisticated identity security functionality.

What’s included?

Prevention

  • Multilayered malware protection. To identify and block commodity and unknown or targeted malware before it can execute.
  • Blocked malicious files and applications. If an executable file or macro attempts to run, we’ll analyse it in a secure sandbox and block any threats.
  • Exploit prevention. We’ll stop known, zero day and unpatched vulnerabilities. And we’ll protect applications that are commonly attacked - including web browsers, office applications, email clients and document readers.
  • Ransomware protection. To block new or unknown variants, based on behaviour, before they can encrypt data and spread on your network.

Detection

  • Near real-time detection. We’ll detect, investigate and analyse root causes of threat activity at all stages of the attack lifecycle.
  • World-class threat intelligence. Combined with comprehensive behavioural monitoring of more than 700 unique attacker tactics, techniques and procedures.
  • Rule base mapped to Mitre ATT&CK techniques. We constantly update our rule base to detect new and emerging attacker behaviours, ‘fileless’ malware and evasion techniques.
  • Automated analytics and context enrichment. To cut the time between detection and response down to seconds or minutes.

Response

  • Malicious activity blocked, with minimal business impact. We’ll terminate and quarantine suspicious processes to prevent further damage - without harming your ability to collect malware samples and forensic evidence.
  • Isolate attackers from the network. We’ll isolate suspected or known compromised machines, on or off your network.
  • Forensic evidence, captured quickly. We’ll capture malicious files and forensic evidence, using dynamic sandbox analysis or manual reverse engineering.

Hunting

  • Ongoing, proactive hunting. Our threat-hunting teams investigate leads that are automatically created by contextual tagging of unusual behaviour. We complement this with targeted hunting, based on your unique environmental risks, changes to your threat landscape, or through intelligence on new attack campaigns and techniques.
  • Machine learning analytics. We augment human experience with machine learning analytics, which can highlight subtle behavioural changes in petabytes of data. Our approach uses time, entity and peer-group models to quickly spot anomalies which suggest highly evasive threats. This means we can prioritise mitigation before threats become breaches.

Related services

Managed Cloud Security (MCS)

Get a single view of all your cloud assets and exposures across multiple providers. Combined with our threat intelligence and expertise, Our MCS services provide the platform and support in the people and processes required to drive ongoing change. All complemented by 24x7 identification and support in resolving critical configuration issues.

Find out more

Contact us

Ross Foley

Ross Foley

Managed Cyber Defence lead, PwC United Kingdom

Tel: +44 (0)7843 330838

Nicola  Jakeman

Nicola Jakeman

Service Delivery Lead, PwC United Kingdom

Tel: +44 (0)7483 347239

Follow us