WithSecure™ launched Co-Monitoring service
November 2023 by Marc Jacob
WithSecure™ (formerly known as F-Secure Business) and its recently launched Co-Monitoring service continues to power growth for partners looking to provide effective detection and response capabilities to mid-market organizations that lack in-house resources to monitor their IT infrastructure around the clock.
WithSecure™ Co-Monitoring is a continuous monitoring service in which WithSecure’s detection and response team investigate and provide remediation advice related to detections generated by WithSecure™ Elements Endpoint Detection and Response (EDR).
The service, which was launched on a trial basis in May and made generally available in October, has already proved popular among partners.
“We are very excited to offer the product as part of our portfolio, because we think it will be an easy sell and a huge value add to us. We know our customers will be excited as well. It will also show how important EDR (Endpoint Detection & Response) is in today’s security world,” said Mike Lahosky, Director of Sales Enablement and Delivery at Vortalsoft Inc.
The service is available as an add-on to WithSecure™ Elements EDR, a leading endpoint detection and response solution. Key benefits for Elements EDR customers include:
• Monitoring (24/7 or out-of-hours) of severe-risk detections by WithSecure™.
• Validation and investigation of severe-risk detections by a human threat analyst.
• Confirmed attacks are escalated directly to partners or on-call customers.
• Threat analysts provide containment advice for fast and effective remediation.
• Possibility to escalate to Incident Response services, with or without an IR Retainer.
According to Lahosky, WithSecure™ Co-Monitoring has allowed them to make significant, demonstratable security improvements for customers that have already taken the service into use.
WithSecure™ Elements, which can be managed by a trusted service provider or in-house, provides organizations with the flexibility to pick and choose the capabilities they need via different modules. Available modules include Endpoint Protection, Endpoint Detection and Response, Vulnerability Management, Collaboration Protection, and the recently added Cloud Security Posture Management.