SERVICE
CrowdStrike × IdealRoute Consulting
The way office workers work is changing dramatically, and so is the way they think about cybersecurity.
Specifically, there has been a shift from traditional measures of internal and external security to measures based on zero-trust. However, many companies are faced with many issues when they start to consider how to proceed, the scope of consideration, and restrictions in actually introducing a zero-trust mechanism.
DAC, which has expertise in the operation of i-FILTER, m-FILTER, and many other security products, can provide a wide range of support from evaluation and study of EDR products to implementation and operation.
We solve your problems
We will confirm the client's requirements and organize a plan, such as whether the client will conduct PoC/PoV for verification and study period, or whether the client will implement the system as soon as possible and proceed with tuning while operating the system.
Implementation
We configure CrowdStrike on behalf of the client. We will flexibly respond to your requirements in terms of configuration.
※Agent installation is not included in the basic menu.
Start of use
After the setup is completed, Agents will be installed in a few terminals first, and then gradually distributed to all terminals while confirming the normality of the system.
In addition, since a large number of alerts are generated in the initial stage of installation, we will also support tuning for stable operation, such as suppressing unnecessary alerts.