Thank you for Subscribing to CIO Applications Weekly Brief
Thank you for Subscribing to CIO Applications Weekly Brief
With cybersecurity breaches occurring every 39 seconds, companies are on the lookout for holistic cybersecurity solution providers. Yet, about 43 percent of all companies do not have any preventive security measures to tackle or mitigate such attacks. Against this backdrop, SMBs often lack the resources needed to develop and maintain in-house security solutions. What works best for such organizations is outsourcing their requirements to managed security service providers.
To this end, Tuearis Cyber—a Veteran owned Managed Detection and Response company offering a full spectrum of cybersecurity services for small and medium businesses—positions themselves as an ideal cybersecurity partner for their clients. Focusing on Security Information and Event Management (SIEM) and Security Operations Center (SOC), the company deploys and manages security solutions that resolve threats quickly and prevent potential issues before any damage is done.
In an interview with CIO Applications, Jason Elmore, CEO of Tuearis Cyber, draws on his years of experience as a cybersecurity consultant and SIEM specialist to paint a better picture of how the company caters to their clients to address the challenges in the cybersecurity landscape.
Who are your customers, and what are the common challenges they face? Also, could you elaborate on how you mitigate those challenges?
While our center of attention has largely been the mid-size companies, our customers also include Fortune 100 giants and other growing businesses. We believe in learning from various experiences gained from serving small and large businesses and implementing it for the best use.
Talking about the pain points, the enterprises are often skeptical about the level of security services and solutions offered and the management capabilities of their providers. To win our customers’ confidence, we conduct an initial discussion where we answer the frequently asked questions revolving around security concerns.
To comprehend the current cybersecurity issues, existing malware, and industry-related threats, we follow a methodological ‘consultant first’ approach. We try to get the gist of our customers’ pain points and offer them a list of recommendations based on what they have in place, what we would put in place, and how we can manage it.
We not only deploy effective technologies and preventive security measures but also gives our clients the confidence to tackle any existing and future security threats
What are some of your core offerings, and how you go about delivering them to your clients?
The core of our managed service offerings includes network monitoring, SOC, firewalls, endpoint security platforms, mobile security, and a lot more. Providing a holistic implementation approach, we aggregate all the data from apps, servers, applications, and security platforms to cover the client’s security landscape and provide remediation accordingly. We focus on, starting from unified endpoint management, all the way up to email security, SOC-as-a-service, firewall-as-a-service, advanced cybersecurity tools like Endpoint Detection and Response (EDR) hardware licensing and managing existing firewalls. Besides these standard services, Tuearis also provide mobile device management, which guarantees full-fledged security on any device accessing the clients’ data.
Are there any key partners you have collaborated with to extend their solutions to your portfolio?
Recently, we have partnered with IBM to offer our customers a cost-competitive QRadar-as-a-service that helps to detect cybersecurity attacks and network breaches. Partnering with IBM is not only for reselling and deploying the platform but also to provide more value to our existing customers. With that being said, we offer the premier level tools at a cost-effective price. In fact, the whole notion of our partnering lies in making expensive tools and platforms available for small and mid-market companies and driving growth for companies at a price that fits into their budget.
Could you describe a customer success story that you’ve had in the past?
A company approached us after falling victim to a ransomware attack. To remediate it, we used a general IT path, including restoring the lost data and rebuilding servers while analyzing their existing firewalls, email security, and endpoint security. After getting them out of the initial turmoil, we analyzed their security solutions to find the loophole and realized that the attack came in via email. Despite having good firewalls and email security, the company was lacking in maintaining effective endpoint security. Their existing security technologies were not being properly managed or used to their fullest potential. Tuning those technologies and devising a robust endpoint security solution for them, we secured the client’s environment and ensured that they could deal with such incidents in the future. This same client suffered a follow-up attack weeks later but was successfully defended without any further impact on the business. As an affirmation to this, we can say that we not only deploy effective technologies and preventive security measures but also give our clients the confidence to tackle any existing and future security threats.
What does the roadmap of the company look like?
Our focus sticks strictly to keeping our offering up to date and deploying the best-of-breed in each technology area we are dealing with. In terms of covering more sectors, we see notable growth among municipal and state-level governments. With our level of expertise, we have served the markets in Texas and North California. Now with the forthcoming year, we intend to cover larger areas. We have also launched a SOC offering specifically for use by Managed Service Providers due to the recent wave of breaches related directly to the compromised networks of several MSPs. This SOC offering gives MSPs a full Security Operations Center + Endpoint Detection and Response + Incident Response package that they can use to further secure their own networks as well as resell to their clients that are high risk and desire advanced security solutions.