SERVICE
CrowdStrike × IdealRoute Consulting
The way office workers work is changing dramatically, and so is the way they think about cybersecurity.
Specifically, there has been a shift from traditional measures of internal and external security to measures based on zero-trust. However, many companies are faced with many issues when they start to consider how to proceed, the scope of consideration, and restrictions in actually introducing a zero-trust mechanism.
IDR, which has expertise in the operation of i-FILTER, m-FILTER, and many other security products, can provide a wide range of support from evaluation and study of EDR products to implementation and operation.
We solve your problems
We will confirm the client's requirements and organize a plan, such as whether the client will conduct PoC/PoV for verification and study period, or whether the client will implement the system as soon as possible and proceed with tuning while operating the system.
Implementation
We configure CrowdStrike on behalf of the client. We will flexibly respond to your requirements in terms of configuration.
※Agent installation is not included in the basic menu.
Start of use
After the setup is completed, Agents will be installed in a few terminals first, and then gradually distributed to all terminals while confirming the normality of the system.
In addition, since a large number of alerts are generated in the initial stage of installation, we will also support tuning for stable operation, such as suppressing unnecessary alerts.
In addition to support for all phases from the proposal of the installation configuration to the start of use, we also provide an inquiry period to ensure a smooth start of use.
Implementation of Poc and PoV | - We perform the initial setup required for operation. |
---|---|
Requirement definition and design | Hearing the customer's system environment in detail |
Setup work | Based on the requirements definition and design, we will make the necessary configuration changes. |
Operational design | We design the flow of the operation process, such as organizing the process of alerts from CrowdStrike. |
Tuning support | - Tuning is performed as necessary for alerts that occur. |