DevSecOps for complete pipeline security.
Defence-in-depth against advanced persistent threats.
Data breaches cost enterprises an average of USD3.92 million – it is prudent to cast a wider net, and have multiple lines of defences, against digital-based attacks.
We provide a set of specialist security capabilities that are tightly integrated with existing operational services, or to augment your existing SecOps teams.
Services we provide
- Vulnerability Management
- Best Practice Configuration and Compliance
- Threat Detection and Response
- Network Security
- Host and Endpoint Security
- Application Security
Whole stack security coverage
Versent applies the principles of Agile and Wiki, and Security Orchestration, Automation and Response (SOAR) across our DevSecOps. Our services encompass security across IaaS, Containers, Serverless, and includes: threat modelling, code scanning, package scanning, auto vulnerability testing and checking, policy checking, SIEM, security dashboard and risk reporting, compliance monitoring across build, non-production and production environments.
Our service features
- 24×7 security incident response
- Cost optimisation
- Evergreen security services – renew, configure and maintain AWS native security services to best practice
- AWS Best Practice Configuration
- Event management (SIEM) – Versent quickly contextualises and triages security events, working seamlessly with your in-house team or partners
- Versent is a certified AWS Managed Services Security Partner
Customer Success.
Featured Case Study
Service NSW is an agency of the New South Wales (NSW) government which provides the state’s citizens with access to more than NSW government services, from applying for a child’s birth certificate to licences for starting a business.
See case study →Versent’s Security Assessment.
Cybersecurity is an ever-present critical, addressable issue for all CIOs, CISOs, and their customers. To meet these concerns, Versent has developed a security assessment framework mapped directly to AWS security best practice. We facilitate outcomes through a blend of onsite and remote workshops, contextual interviews, documentation review and analysis. This can be delivered in isolation or as an extension to an AWS Well Architected Review.
The security assessment includes:
- A high-level assessment of the current state of technology, processes and capability within the AWS Operational landscape
- Understanding the Security Requirements and Objectives, and how these align to the deployed services
- Reviewing documentation and conducting workshops regarding architecture, incident response approach, current controls and configurations
- Identify gaps related to workload security
- Incorporate consideration of any existing investments in approaches and tooling that can be leveraged
- Develop a Security Operations blueprint, including patterns, new processes or technologies and a roadmap to achieve the desired outcomes.
15 mins
response
30 mins
restoration
15 biz days
rectification
Swift resolutions for minimal impacts
Versent’s incident SLAs for Severity 1 issues