Accordant Security Solutions
Cisco Firepower® Training Services
Critical to any organisation achieving expected levels of return on investment and risk reduction is ensuring your technical resources are trained correctly, thus ensuring full advantage of all the features and capabilities of Cisco Firepower® Threat Defense are achieved.
Our Training is provided by a mix of classroom style delivery and practical hands on experience using our own dedicated labs.
We offer a comprehensive training pathway which can be taken as individual modules, or combined in a compete programme:
- Firepower Overview
- Firepower Security Analysis
- Firepower Advanced
Our flexible courses can be tailored to your individual needs:
- Course duration from 1-5 days
- On-Premise or Off-Site
Contact us to see how our FTD Training can help you realise increased levels of security, reduce risk and maximise the return on your investment.
*Cisco Firepower® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Cisco Stealthwatch® Enterprise Remediation Services
Cisco Stealthwatch® uses data from existing network infrastructure for advanced threat detection, deeper forensics and simplified network segmentation. With industry-leading machine-learning and behavioural modelling, you can outsmart emerging threats in your digital business.
These capabilities and features take network threat and rogue object detection beyond the perimeter deep inside the network.
Visibility: Identify attacks that get past your perimeter defences
Traffic Baselining: Watching traffic for a period of time to create a standard baseline which it can alert when traffic behaviour deviates.
Rogue Device Detection: Looking for device activity which does not conform
Response & Forensics: Quickly detect zero-day malware, insider threats and data exfiltration, advanced persistent threats, and sophisticated attacks.
Simplify: Effective segmentation of the network. Use the Stealthwatch integration with Cisco Identity Services Engine (ISE) to create and enforce policies.
Secure Datacentre: Extend visibility and control to your data centre, monitoring both north-south and east-west traffic.
Public Cloud: Utilising the capabilities of Stealthwatch Cloud you can now you can achieve visibility and threat detection in the public cloud. Cisco Stealthwatch capabilities allow for securing workloads in Amazon Web Services, Google Cloud Platform and Microsoft Azure
External Threat Detection: Looking for network activity involving external IP/Websites which are on known blacklists.
Cyber Security Assessment
With the ever increasing sophistication of cyber security threats and the steep financial and reputational consequences of data breaches an overarching Cyber Assessment from Accordant can help you determine which threat vectors primarily apply to you allowing you to prioritise your defence spending.
Maximise the value from current deployments, reduce ongoing risk, target cyber defence spending and deliver measurable results.
Don’t guess, Assess
Data Loss Prevention Remediation Service
Too often Data Loss Prevention (DLP) is just viewed through the prism of technology. Whilst the design and implementation of technology is critical to supporting any successful DLP programme, risk mitigation and risk reduction can only be truly realised through the design and implementation of a Data Loss Prevention Strategy, where people and processes are viewed as key parts equally with the technology, and together they collectively deliver a successful DLP implementation.
Ask us about our case studies and ROI driven DLP deployments.