https://store-images.s-microsoft.com/image/apps.1313.28a22b6d-03fd-41e2-966b-3f827470ee49.03ba6fa2-eabb-4479-9b14-31752a519001.6926bc3b-fb34-4e16-9ee3-16bf83a5dae6

EY NextGen Cyber Managed Services

EY Global

EY NextGen Cyber Managed Services

EY Global

The next-gen security operations services of EY

EY Sentinel as a Service for IT, OT and IoT Solution overview:

EY Sentinel as a Service for IT, OT and IoT is an advanced cyber intelligence and automation platform for innovation that can assist you to automatically discover “advanced-attack patterns” and proactively strengthen your protection capability. This will include being able to utilize our security experts who will not only monitor your environment for security threats 24x7, but also will work with your team to customize and improvise the Microsoft Sentinel platform continuously to best fit your environment and use cases.


EY Sentinel as a Service for IT, OT and IoT Solution benefits:

  • Visibility: Quickly gain visibility over your cloud environment, and combine with integrated, on-premises data sources to achieve a full view
  • Advanced capability: Apply the capabilities of Microsoft’s cloud-scale security analytics, EY teams will help you to harness these capabilities with a threat-centric approach to detection and response
  • Cost-effectiveness: Scale to meet demand during increased attack (reduce again when back to steady state)
  • Initial benefits: Begin detections within your connected environment from day one, realize cost savings through fast, streamlined cloud-native deployment
  • Long-term benefits: Realize longer-term efficiency by automating integration of new data sources as they are created, while EY Sentinel as a Service for IT, OT and IoT scales automatically to meet your needs

EY Managed Extended Detection and Response (MXDR) for IT, OT and Cloud Solution powered by Microsoft Sentinel and Microsoft Defender for Endpoints Overview:

•The EY MXDR offering for IT, OT and cloud can be deployed to focus on IT environments, OT environments, including hybrid environments. For clients with an existing, mature cybersecurity monitoring capability, a stand-alone IT or OT-focused MXDR solution may be preferred.
•Where feasible, an integrated, end-to-end EY MXDR capability provides economy of scale in 24x7x365 detect, disrupt, respond and escalate capabilities leveraging Microsoft Technology stack that includes Microsoft Sentinel, Defender for Endpoint, Defender for Office 365, Defender for Cloud, Defender for Identity, and other Microsoft enabling technologies.
•EY MXDR focus areas are:
•24x7x365 monitoring for suspicious and malicious activity wherever your digital assets reside
•Triaging alerts reporting suspicious activity to determine if is a cyber incident that needs to be contained and remediated
•Communicating potential or actual incident to resources to take appropriate action
•Managing and helping optimize enabling technologies to identify attack activity in your environment

•Reporting on performance MXDR function effectiveness, which includes EY monitoring and triage of client custom rules or alerts
•The EY MXDR offering for IT, OT and cloud is part of the EY Cybersecurity Managed Services (CMS) portfolio.
•EY CMS accelerates and sustains transformative, leading practice cybersecurity operations to improve your cyber resiliency, reduce your digital risks and protect your business.

EY Managed Extended Detection and Response (MXDR) for IT, OT and Cloud Solution benefits:
•Gain access to the named, assigned “core team” provides you subject matter resources who know your organization.
•Avail tailored reporting and actionable tickets that provide insights to help inform your cyber defense investments.
•Respond to threats via EY Security Orchestration, Automation and Response (SOAR) platform with playbooks tailored to your processes.
•Improve threat visibility and detection logic across the MITRE Adversarial Tactics, Techniques and Common Knowledge (MITRE ATT&CK®) life cycle.
•Identify malware and interactive attacker patterns and techniques using detection logic from the EY Attack Intelligence Lab (AIL).
•Gain access to US$1.5m investment in multiple commercial cyber threat intelligence feeds and work with an assigned intel analyst.
•Get transparent service and processes with client access to EY provided, commercial enabling technology.
•Extensive organizational integration leveraging your ticketing system and custom attack disruption actions.

https://store-images.s-microsoft.com/image/apps.46757.28a22b6d-03fd-41e2-966b-3f827470ee49.65a2d968-26a0-4a14-99a6-8b2f7b07aeae.b3660456-c18e-4775-8d68-d67f6623c41b
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.46757.28a22b6d-03fd-41e2-966b-3f827470ee49.65a2d968-26a0-4a14-99a6-8b2f7b07aeae.b3660456-c18e-4775-8d68-d67f6623c41b
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.25093.28a22b6d-03fd-41e2-966b-3f827470ee49.e0bde1f5-eaed-4014-900d-f469c1c28816.0c71b819-aa29-47fc-815a-15c173bd36ec