Author: Stacey Redshaw

Chillisoft’s ESET Managed Detection and Response Service is a comprehensive security services package. It fuses the advantages of granular visibility provided with the knowledge and experience of industry-leading experts to deliver improved detection, threat hunting, investigation and targeted actions to eliminate threats.The MDR service covers everything from basic malware investigation and removal to file analysis, incident investigation, response and digital forensics. Chillisoft’s ESET Managed Detection and Response Service is available in two package options: ESET Detection and Response Premium and ESET Detection and Response Platinum. ESET Detection and Response Premium – Business HoursESET Detection and Response Premium is a comprehensive…

Read More

Chillisoft Service Level Agreement (MDR, IDR) 1. Scheduled Maintenance Scheduled maintenance is any maintenance that is performed by Chillisoft during a scheduled maintenance window (7:00PM NZT – 7:00AM NZT). Chillisoft will provide a 48-hour notice to its platform for any high-impact changes, excluding any unscheduled emergency maintenance that needs to be performed for stability or security of the platform. 2. Incident Investigation Procedure 2.1 Chillisoft will be responsible for alert analysis and investigation to determine if alerts or security events warrant alert classification or escalation. Chillisoft will follow established escalation paths and utilize contact information collected during the on-boarding process,…

Read More

Chillisoft’s SOC/SIEM service 1. Overview This SOC incident response procedure establishes an integrated approach between CHILLISOFT and its clients to jointly respond to security incidents. The procedure outlines the information passed to the appropriate personnel, assessment of the incident, the integrated response, documentation, and preservation of evidence. 2. Purpose • Keep all stakeholders informed of the situation and the response • Ensure a rapid, documented and controlled response to information security incidents • Verification that an incident occurred. • Maintain or restore business continuity • Minimise the impact of the incident • Determine how the incident was executed and prevent…

Read More