Securing business data

Network Security Monitoring

Unified Security Management

CNS Mosaic Managed Services use a Unified Security Management (USM) Platform to provide Network Security Monitoring.

The USM service provides comprehensive security visibility and is critical in uncovering security breaches; providing a holistic view of events across customer networks and reflects the need to identify security incidents at various touch points:

code maintenance

Asset Discovery and Inventory

The asset discovery module utilises in built active network scanning, passive network monitoring, asset inventory, host-based software inventory components. These are used to provide visibility to the assets on customer’s networks to ascertain:

  • What devices are on my network?
  • What are users doing?
  • What vulnerabilities exist in my network?
  • Are there known attackers trying to interact with my network?
  • Are there active threats in my network?

Asset Discovery and Inventory

The asset discovery module utilises in built active network scanning, passive network monitoring, asset inventory, host-based software inventory components. These are used to provide visibility to the assets on customer’s networks to ascertain:

  • What devices are on my network?
  • What are users doing?
  • What vulnerabilities exist in my network?
  • Are there known attackers trying to interact with my network?
  • Are there active threats in my network?

Behavioural Monitoring

Behavioural monitoring for network & systems is essential for spotting unknown threats. It's also useful in investigating suspicious behaviour and policy violations.

It is designed to understand “normal” system and network activity. Using the built-in network behaviour monitoring CNS can provide incident response when investigating an operational issue or potential security incident. Additionally because CNS can combine network behavioural analysis with service availability monitoring they are able to provide a full picture of system, service, and network anomalies.

Log Collection

Log collection is the ability to ingest log data into the system for automatic import and integration. This is a fundamental principle of the service because with it the current security posture of a network cannot be ascertained.

Network Flow Analysis

Performs network behaviour analysis without needing the storage capacity required for full packet capture. Network flow analysis provides the high-level trends related to what protocols are used, which hosts use the protocol, and the bandwidth usage. This information can then be accessed in the same interface as the asset inventory and alarm data to simplify incident response.

call us

Get in touch

Talk to our experts today +44 (0) 20 7592 8800

Send us a message

We'll get back to you Send us a message

Connect with us

See what we're saying elsewhere