Managed Detection and Response
Argus MDR provides 24x7 managed protection against cyberattacks and security threats. With complete enterprise coverage, including cloud, data centre, network and endpoint, our expert team of security analysts, incident responders and threat researchers will act as an extension of your security team to help you defend against today’s complex cyberattacks.
Features
- 24x7 security monitoring
- Event analysis
- Incident alerting
- Stream analysis
- Global Threat Intelligence
- Flexible, Customizable and Scalable service
- Advanced threat detection and hunting
- Incident Response
- Real Time Reporting
- Customisable Dashboard
Benefits
- Dedicated Technical Account Manager
- Regular service meetings for incident review, service improvement and recommendations
- Reporting of your security status
- Actionable response recommendations
- Reporting of your security status
- Access to over 20+ years of security competency and consultancy
- Quickly React to Incidents anytime
- Gain Insight into your threat landscape and security posture
- Customise the service to best suit your teams needs
Pricing
£3 to £50 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 9 6 8 5 9 0 3 5 6 5 6 5 6 8
Contact
Mnemonic AS
Nathan Jones
Telephone: +447891234688
Email: nathan@mnemonic.co.uk
Service scope
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Analysts are available 24/7 to answer questions
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- All customers receive the same support level. At the start of each project, the customer is assigned a Technical Account Manager (TAM) from mnemonic whose responsibility is to coordinate and attend regular service meetings. The TAM serves as a trusted adviser to the customer to make recommendations on how to improve the service and security in general. This is all included in the service cost.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Argus MDR Service is implemented using mnemonic’s project management framework. Our framework is based on core principles from PMI and Prince2, and has been customised over the years based on our experience in successfully implementing our services. The framework ensures that our implementation projects meet the agreed expectations, are of a high quality and are delivered on time.
The service implementation project encompasses technical components, such as physical installation and device configuration, along with information gathering activities focused on customer business operations, service deliverables and escalation procedures.
The implementation service is a mandatory component of the Argus MDR Service initialisation. The implementation project has various components that may be delivered on-site, while other deliverables can be performed remotely.
An example of project tasks and deliverables includes:
- Arrange start up meeting for the service with relevant Customer personnel and mnemonic personnel, as an introduction to the service
- Service design: high and low-level designs
- Planning technical and procedural integration of service, including establish customer- and solution-specific management routines and documentation for the operations centre
- Classification and documentation of assets and services
- Establish secure communication lines between the mnemonic and the customer - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
At the end of every contract the customer is assigned a dedicated project team in order to ensure the smooth handover and decommissioning of the service. This project will include the decommissioning of devices, support in ensuring their return and handover of any requested data or logs.
Mnemonic is able to assist in the handover to a new provider where reasonable. - End-of-contract process
- Mnemonic would run an offboarding project which includes data handover, decommissioning instructions and a handover meeting. Additional activities will be evaluated and may be priced depending on time and material.
Using the service
- Web browser interface
- Yes
- Using the web interface
-
All customers have access to the Argus customer portal which is available through a web interface, or the Argus mobile application.
Through this portal customers can assign an unlimited amount of users with the necessary privileges to make changes. User led changes include changes to dashboards, privileges, reporting settings and certain changes to incidents. Further more complex changes can be completed by the Security Operations Centre that can be informed via the web interface. - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- N/A
- Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- https://docs.mnemonic.no/display/public/API/mnemonic+API+documentation
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- We perform extensive capacity planning and constant monitoring of resources according to demand. We have the ability to quickly scale up if needed.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- All data relevant for the managed service delivery
- Backup controls
- Users do not control that as it is part of the managed service delivery
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- Other
- Other protection within supplier network
- SSH
Availability and resilience
- Guaranteed availability
-
The Service Provider delivers a high-quality service that is built upon high availability capabilities. This includes high availability of the Argus Customer Portal and high availability for communications between the Service Provider’s central service components and the End Customer.
The Service is guaranteed to be available with a 99.9% availability rate. The availability rate is measured over the period of one calendar month and excludes scheduled maintenance windows.
An availability breach occurs if the Service is available for less than 99.9% in a given month. In such cases, the End Customer will be entitled to Service Credits in accordance with the following table:
100% - 99.9% availability - Service Credit - 0
99,9% - 99 % availability - Service Credit - 3
99 % - 98,5 % availability - Service Credit - 6
98.5 % - 98 % availability - Service Credit - 15
Service Credits are awarded in the event that the Service Provider breaches specific service levels within the agreement. The value of a Service Credit is 1/30th of the monthly cost for the SLA that was in breach and is automatically redeemed on the next service invoice. - Approach to resilience
- Available upon request.
- Outage reporting
- Outages are reported through the customer portal which is also available through APIs and email alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Privileged access on a company level (e.g. domain admin) can only be given to authorized personnel. This is enforced by requirement of role and department, training in the system (e.g. from Microsoft if for Active Directory), and one-on-one briefing with manager to verify integrity, veracity, and trust.
Management interfaces are only accessible through an internal secure network which is not connected to the internet. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DNV GL - Business Assurance
- ISO/IEC 27001 accreditation date
- 31/05/2005
- What the ISO/IEC 27001 doesn’t cover
-
The certificate is valid for the following scope:
Security solutions sales, support and system integration. Security solutions consulting. Managed security services. Risk-based vulnerability analysis, penetration testing, security audit of applications, networks and security systems. In accordance with Statement of Applicability version 136, 2022-02-16 - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- SRC - Security Research and Consulting, GmbH
- PCI DSS accreditation date
- June 2018
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001:2015
- NSM quality scheme for incident handling
- SOC 2 - SOC for Service Organizations
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Mnemonic’s Chief Information Security Officer (CISO) is responsible for information security in mnemonic, including promoting security throughout the organization.
In mnemonic we have integrated our security and quality management system. The ISMS (Information Security Management System) is governed by our CISO and the ISMS-forum. The ISMS-forum consists of 10 people with relevant roles and responsibilities in mnemonic to govern all core business processes.
To ensure efficiency of the ISMS, we have implemented an information risk framework that clearly identifies consequence, likelihood, roles, responsibilities, remediation and risk acceptance criteria. The framework relates to all information processed and has been revised to ensure appropriate evaluation of privacy risk aligned with our DPIA process.
To ensure that every employee understands their responsibilities to follow the requirements set in the ISMS we have implemented several policies.
Some examples of policies implemented:
• Information security
• Privacy
• Secure development (Including Privacy by Design/Default)
• Change management
• Disaster recovery and Incident handling
• Acceptable use
To ensure that every employee understands their responsibilities to follow the requirements set in the ISMS we have implemented several policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change management is carried out in co-operation with the customer. All change management is logged and recorded via the Argus platform. Security is at the core of the offering so all changes are assessed based on the impact it has on the security of the service.
In general, the Services have no hard limit on the number of changes within a given period. However, should the Service Provider find the number of changes to be unreasonably high, the Service Provider, together with the Customer, will investigate the cause(s) and request the Customer to take corrective action. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Mnemonic’s entire infrastructure, both for service delivery and users, is monitored 24x7 by our Argus Managed Defence service – meaning all internal security incidents are escalated directly to our SOC and assessed by security analysts 24x7.
mnemonic subject all networks to continuous authenticated vulnerability monitoring. If severe vulnerabilities are discovered, mnemonic will initiate specified scans to identify if the vulnerabilities occur in our systems. The results from these internal and external scanning activities are reported in Argus and monitored by our internal infrastructure team. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We have established a strict regime for control, protection and monitoring of our systems against malicious content. This is part of our core services and we are a customer of ourselves, including our 24/7 Security Monitoring and our Incident Response services.
We proactively use threat hunting to identify potential incidents in both mnemonic's, and our customers, environments. If an incident is identified we have a 24/7 incident response team who can respond immediately. - Incident management type
- Supplier-defined controls
- Incident management approach
- The incident management process is described in our Quality Management system based on the ISO 27001 framework. Detection and reporting is based on the same service we provide to our customers, including playbooks and report templates for common events and incidents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- VMware
- How shared infrastructure is kept separate
- Customers are segmented individually and customer sites can only be reached from a secure zone segmented from our internal and other zones. Data is segmented throughout our Argus platform from time of ingestion.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Concurrently maintainable data center, EN 50600 Class 3, conform to Class 4 - EU Data Centre Code of Conduct
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Wellbeing
Fighting climate change
mnemonic complies with national and international environmental legislation, and has operationalized its environmental commitment through specific measures as part of the certification as an Environmental Lighthouse.
With this, the company can document compliance with strict criteria within energy, transport, purchasing, waste, emissions, aesthetics and working environment. Eco-Lighthouse places strict demands on management and mnemonic's employees, and shows our suppliers, customers and partners that we take environmental work seriously. The certificate is valid for the period 2019-2022.
mnemonic moved its head office to Indekshuset, Oslo in August 2019. The building has a green profile with a high degree of waste recycling, activity-based lighting and ventilation that significantly reduces the climate footprint.Tackling economic inequality
mnemonic acts in accordance with social legislation, including:
Forced labor / slave labor (ILO Convention Nos. 29 and 105)
Trade union organization and collective bargaining (ILO Convention Nos. 87, 98, 135 and 154)
Child labor (UN Convention on the Rights of the Child, ILO Convention Nos. 138, 182 and 79, ILO Recommendation No. 146)
Discrimination (ILO Conventions Nos. 100 and 111 and the UN Convention on the Elimination of All Forms of Discrimination against Women)
Brutal treatment (UN Convention on Civil and Political Rights, Art. 7)
Health, safety and the environment (ILO Convention No. 155 and Recommendation No. 164)
Wages (ILO Convention No. 131)
Working hours (ILO Convention Nos. 1 and 14)
Regular employment (ILO Convention Nos. 95, 158, 175, 177 and 181)
Marginalized population groups (UN Convention on Civil and Political Rights, Articles 1 and 2)Wellbeing
Working environment is an important focus for the company, and is described in our Code of Conduct. We work actively to ensure good working conditions for our employees, which has yielded results. mnemonic is consistently rated amongst the top employers in Norway and Europe. In 2023 mnemonic was rated 1st in the “Great Place to Work” assessment for Norway. Based on a company culture with shared incentives for long term value, the employee retention rate has always been above 96%.
Pricing
- Price
- £3 to £50 a user a month
- Discount for educational organisations
- No
- Free trial available
- No