Mnemonic AS

Managed Detection and Response

Argus MDR provides 24x7 managed protection against cyberattacks and security threats. With complete enterprise coverage, including cloud, data centre, network and endpoint, our expert team of security analysts, incident responders and threat researchers will act as an extension of your security team to help you defend against today’s complex cyberattacks.


  • 24x7 security monitoring
  • Event analysis
  • Incident alerting
  • Stream analysis
  • Global Threat Intelligence
  • Flexible, Customizable and Scalable service
  • Advanced threat detection and hunting
  • Incident Response
  • Real Time Reporting
  • Customisable Dashboard


  • Dedicated Technical Account Manager
  • Regular service meetings for incident review, service improvement and recommendations
  • Reporting of your security status
  • Actionable response recommendations
  • Reporting of your security status
  • Access to over 20+ years of security competency and consultancy
  • Quickly React to Incidents anytime
  • Gain Insight into your threat landscape and security posture
  • Customise the service to best suit your teams needs


£3 to £50 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

9 4 2 3 1 8 0 5 7 9 5 5 0 9 3


Mnemonic AS Nathan Jones
Telephone: +447891234688

Service scope

Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Analysts are available 24/7 to answer questions
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
All customers receive the same support level. At the start of each project, the customer is assigned a Technical Account Manager (TAM) from mnemonic whose responsibility is to coordinate and attend regular service meetings. The TAM serves as a trusted adviser to the customer to make recommendations on how to improve the service and security in general. This is all included in the service cost.
Support available to third parties

Onboarding and offboarding

Getting started
Argus MDR Service is implemented using mnemonic’s project management framework. Our framework is based on core principles from PMI and Prince2, and has been customised over the years based on our experience in successfully implementing our services. The framework ensures that our implementation projects meet the agreed expectations, are of a high quality and are delivered on time.

The service implementation project encompasses technical components, such as physical installation and device configuration, along with information gathering activities focused on customer business operations, service deliverables and escalation procedures.

The implementation service is a mandatory component of the Argus MDR Service initialisation. The implementation project has various components that may be delivered on-site, while other deliverables can be performed remotely.

An example of project tasks and deliverables includes:

 - Arrange start up meeting for the service with relevant Customer personnel and mnemonic personnel, as an introduction to the service
 - Service design: high and low-level designs
 - Planning technical and procedural integration of service, including establish customer- and solution-specific management routines and documentation for the operations centre
 - Classification and documentation of assets and services
 - Establish secure communication lines between the mnemonic and the customer
Service documentation
Documentation formats
End-of-contract data extraction
At the end of every contract the customer is assigned a dedicated project team in order to ensure the smooth handover and decommissioning of the service. This project will include the decommissioning of devices, support in ensuring their return and handover of any requested data or logs.
Mnemonic is able to assist in the handover to a new provider where reasonable.
End-of-contract process
Mnemonic would run an offboarding project which includes data handover, decommissioning instructions and a handover meeting. Additional activities will be evaluated and may be priced depending on time and material.

Using the service

Web browser interface
Using the web interface
All customers have access to the Argus customer portal which is available through a web interface, or the Argus mobile application.
Through this portal customers can assign an unlimited amount of users with the necessary privileges to make changes. User led changes include changes to dashboards, privileges, reporting settings and certain changes to incidents. Further more complex changes can be completed by the Security Operations Centre that can be informed via the web interface.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Web interface accessibility testing
What users can and can't do using the API
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
Command line interface


Scaling available
Scaling type
Independence of resources
We perform extensive capacity planning and constant monitoring of resources according to demand. We have the ability to quickly scale up if needed.
Usage notifications
Usage reporting
  • Email
  • Other


Infrastructure or application metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
What’s backed up
All data relevant for the managed service delivery
Backup controls
Users do not control that as it is part of the managed service delivery
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network

Availability and resilience

Guaranteed availability
The Service Provider delivers a high-quality service that is built upon high availability capabilities. This includes high availability of the Argus Customer Portal and high availability for communications between the Service Provider’s central service components and the End Customer.

The Service is guaranteed to be available with a 99.9% availability rate. The availability rate is measured over the period of one calendar month and excludes scheduled maintenance windows.

An availability breach occurs if the Service is available for less than 99.9% in a given month. In such cases, the End Customer will be entitled to Service Credits in accordance with the following table:

100% - 99.9% availability - Service Credit - 0

99,9% - 99 % availability - Service Credit - 3

99 % - 98,5 % availability - Service Credit - 6

98.5 % - 98 % availability - Service Credit - 15

Service Credits are awarded in the event that the Service Provider breaches specific service levels within the agreement. The value of a Service Credit is 1/30th of the monthly cost for the SLA that was in breach and is automatically redeemed on the next service invoice.
Approach to resilience
Available upon request.
Outage reporting
Outages are reported through the customer portal which is also available through APIs and email alerts.

Identity and authentication

User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Privileged access on a company level (e.g. domain admin) can only be given to authorized personnel. This is enforced by requirement of role and department, training in the system (e.g. from Microsoft if for Active Directory), and one-on-one briefing with manager to verify integrity, veracity, and trust.

Management interfaces are only accessible through an internal secure network which is not connected to the internet.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
  • Dedicated device on a segregated network (providers own provision)
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
DNV GL - Business Assurance
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
The certificate is valid for the following scope:

Security solutions sales, support and system integration. Security solutions consulting. Managed security services. Risk-based vulnerability analysis, penetration testing, security audit of applications, networks and security systems. In accordance with Statement of Applicability version 128, 2019-03-18
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
SRC - Security Research and Consulting, GmbH
PCI DSS accreditation date
June 2018
What the PCI DSS doesn’t cover
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • ISO 9001:2015
  • NSM quality scheme for incident handling
  • SOC 2 - SOC for Service Organizations

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Mnemonic’s Chief Information Security Officer (CISO) is responsible for information security in mnemonic, including promoting security throughout the organization.

In mnemonic we have integrated our security and quality management system. The ISMS (Information Security Management System) is governed by our CISO and the ISMS-forum. The ISMS-forum consists of 10 people with relevant roles and responsibilities in mnemonic to govern all core business processes.

To ensure efficiency of the ISMS, we have implemented an information risk framework that clearly identifies consequence, likelihood, roles, responsibilities, remediation and risk acceptance criteria. The framework relates to all information processed and has been revised to ensure appropriate evaluation of privacy risk aligned with our DPIA process.

To ensure that every employee understands their responsibilities to follow the requirements set in the ISMS we have implemented several policies.

Some examples of policies implemented:

• Information security
• Privacy
• Secure development (Including Privacy by Design/Default)
• Change management
• Disaster recovery and Incident handling
• Acceptable use

To ensure that every employee understands their responsibilities to follow the requirements set in the ISMS we have implemented several policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change management is carried out in co-operation with the customer. All change management is logged and recorded via the Argus platform. Security is at the core of the offering so all changes are assessed based on the impact it has on the security of the service.

In general, the Services have no hard limit on the number of changes within a given period. However, should the Service Provider find the number of changes to be unreasonably high, the Service Provider, together with the Customer, will investigate the cause(s) and request the Customer to take corrective action.
Vulnerability management type
Vulnerability management approach
Mnemonic’s entire infrastructure, both for service delivery and users, is monitored 24x7 by our Argus Managed Defence service – meaning all internal security incidents are escalated directly to our SOC and assessed by security analysts 24x7.

mnemonic subject all networks to continuous authenticated vulnerability monitoring. If severe vulnerabilities are discovered, mnemonic will initiate specified scans to identify if the vulnerabilities occur in our systems. The results from these internal and external scanning activities are reported in Argus and monitored by our internal infrastructure team.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have established a strict regime for control, protection and monitoring of our systems against malicious content. This is part of our core services and we are a customer of ourselves, including our 24/7 Security Monitoring and our Incident Response services.

We proactively use threat hunting to identify potential incidents in both mnemonic's, and our customers, environments. If an incident is identified we have a 24/7 incident response team who can respond immediately.
Incident management type
Supplier-defined controls
Incident management approach
The incident management process is described in our Quality Management system based on the ISO 27001 framework. Detection and reporting is based on the same service we provide to our customers, including playbooks and report templates for common events and incidents.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Who implements virtualisation
Virtualisation technologies used
How shared infrastructure is kept separate
Customers are segmented individually and customer sites can only be reached from a secure zone segmented from our internal and other zones. Data is segmented throughout our Argus platform from time of ingestion.

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Concurrently maintainable data center, EN 50600 Class 3, conform to Class 4 - EU Data Centre Code of Conduct

Social Value

Fighting climate change

Fighting climate change

mnemonic complies with national and international environmental legislation, and has operationalized its environmental commitment through specific measures as part of the certification as an Environmental Lighthouse.

With this, the company can document compliance with strict criteria within energy, transport, purchasing, waste, emissions, aesthetics and working environment. Eco-Lighthouse places strict demands on management and mnemonic's employees, and shows our suppliers, customers and partners that we take environmental work seriously. The certificate is valid for the period 2019-2022.

mnemonic moved its head office to Indekshuset, Oslo in August 2019. The building has a green profile with a high degree of waste recycling, activity-based lighting and ventilation that significantly reduces the climate footprint.
Tackling economic inequality

Tackling economic inequality

mnemonic acts in accordance with social legislation, including:

Forced labor / slave labor (ILO Convention Nos. 29 and 105)
Trade union organization and collective bargaining (ILO Convention Nos. 87, 98, 135 and 154)
Child labor (UN Convention on the Rights of the Child, ILO Convention Nos. 138, 182 and 79, ILO Recommendation No. 146)
Discrimination (ILO Conventions Nos. 100 and 111 and the UN Convention on the Elimination of All Forms of Discrimination against Women)

Brutal treatment (UN Convention on Civil and Political Rights, Art. 7)
Health, safety and the environment (ILO Convention No. 155 and Recommendation No. 164)
Wages (ILO Convention No. 131)

Working hours (ILO Convention Nos. 1 and 14)
Regular employment (ILO Convention Nos. 95, 158, 175, 177 and 181)
Marginalized population groups (UN Convention on Civil and Political Rights, Articles 1 and 2)


Working environment is an important focus for the company, and is described in our Code of Conduct. We work actively to ensure good working conditions for our employees, which has yielded results. mnemonic is consistently rated amongst the top employers in Norway and Europe. In 2022 mnemonic was rated 1st in the “Great Place to Work” assessment for Norway. Based on a company culture with shared incentives for long term value, the employee retention rate has always been above 96%.


£3 to £50 a user a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.