Advanced Threat Analytics (ATA) is a complex system that allows you to protect your IT infrastructure from a variety of information threats and cyberattacks.

    ATA identifies three main types of threats: cyberattacks, abnormal activities and problems, and security risks.

    ATA technologies can detect many types of suspicious activity at various stages of an attack, including:

    • Collecting information about your infrastructure, during which attackers can get data about the network structure and devices, such as servers, network storage, or PCs
    • Implementation, during which attackers spread malware within the network, using software vulnerabilities or unsafe settings of services and servers
    • Managing a domain, during which the attacker collects information that allows them to resume the attack using different credentials, entry points, and vulnerabilities

    Our objective is to plan, design, and implement Advanced Threat Analytics service.

    IT Partner responsibilities #

    1. Customer infrastructure research for developing appropriate architecture solution
    2. ATA architecture design
    3. Preparation of the environment for the ATA installation
    4. Installation and configuration of the ATA service
    5. Basic introduction of working with ATA

    Client responsibilities #

    1. Coordinate Client resources and staff schedules
    2. Provide a dedicated point of contact responsible for working with IT Partner
    3. Coordinate any outside vendor resources and schedules
    4. Configure all networking equipment, such as load balancers, routers, firewalls, and switches
    5. Review and approve engagement deliverables in a timely manner

    Additional cost items not provided by the project #

    1. Advanced Threats Analytics license
    2. On-premises or hybrid Active Directory domain

    Plan #

    The plan may vary depending on your needs.

    1. Kickoff meeting
    2. Infrastructure research
    3. Preparation of the environment
    4. ATA installation and configuration
    5. Verifying and fixing issues

    Success Criteria #

    1. Advanced Threats Analytics installed successfully
    2. The administrator may use the ATA Center to view reports and notifications

    Related services

    Business Process Automation Using Built-in Office 365 Tools and Services

    Business Process Automation (BPA) is the implementation of a business process management system with the help of IT. Such a system simplifies business operations, improves the quality of work, and reduces costs using modern and efficient technologies.

    Security Managed Service: Incident Response

    IT Partner specialists will analyze your company infrastructure and event logs, interview users if necessary, and provide a full report on the incident, as well as measures to prevent its recurrence.