Security & resilience

Cybersecurity Services

Deloitte

Datamount provides managed cybersecurity services that safeguard data centre and cloud workloads, combining continuous monitoring with expert response to help customers stay ahead of evolving threats.

Deloitte & Datamount
Security Managed Service icon

Security Managed Service

Datamount’s Security Managed Service provides day-to-day operation of security controls across networks, servers and cloud platforms. This includes policy management, patching, vulnerability follow-up and incident handling, supported by specialist engineers who help tune defences and reduce risk over time.
SOC as a Service icon

SOC as a Service

SOC as a Service delivers continuous monitoring of logs, events and security alerts from your infrastructure and applications. Correlation rules, threat intelligence and analyst review help detect suspicious activity early, while clear runbooks and response actions support quicker containment and recovery.

Features

SIEM
Security Information and Event Management (SIEM)
• Asset/ Log Source onboarding
• Continuous Integration
• Continuous Deployment
• Continuous management & upkeep of use cases
SOAR
Security Orchestration Automation and Response (SOAR)
• Automation of actions
• Playbook creation and optimization
• Day-to-day management of paybooks and SOAR platform.
• Platform management and upkeep.
EDR
EndPoint Detection and Response (EDR)
• EDR Policy creation & Management
• Automated action configuration
• Continuous Integration/ Onboarding
Vulnerability Management (VM)
Vulnerability Management (VM)*
• Configuration of Vul. Management Scanner.
• Periodic scanning of the assets.
• Support with vul. Tracking and remediation*
• Periodic reporting.
*Available as an additional service for client.
Cyber Threat Intelligence (CTI)
Cyber Threat Intelligence (CTI)
• Subscription to the threat intel database.
• Integration of the Threat Intel DB with SIEM, SOAR, EDR, etc.
Brand Protection
Brand Protection*
• Domain monitoring
• Logo monitoring
• Social media monitoring
• Dark web monitoring
• User account monitoring
*Available as an additional service for client.
SOC ITSM
SOC ITSM
• Monitoring, ticketing & alerting
• Change & configuration management Incident management
• Monitoring
• Event management
• Service Catalog
SOC Assessment and Compliance
SOC Assessment & Compliance Services*
• Integrated Controls Framework
• SOC Assessment
• Integrated controls based on industry standard regulations e.g., MTCIT, ISO,…
*Available as an additional service for client as an independent assessment against the best practices and regulations
People & expertise

Cybersecurity Certifications

NSE 7 logo

NSE 7

CEH logo

CEH

CCS logo

CCS

CCIE Security logo

CCIE Security

CCSA logo

CCSA

CCSE logo

CCSE

APT logo

APT

CRTA logo

CRTA

CRTP logo

CRTP

ADF logo

ADF

ISC2-CC logo

ISC2

OSCP Security logo

OSCP

SC-200 logo

SC-200

Security+ logo

Security+

SCCU logo

SCCU

NSE 7 logo

NSE 7

CEH logo

CEH

CCS logo

CCS

CCIE Security logo

CCIE Security

CCSA logo

CCSA

CCSE logo

CCSE

APT logo

APT

CRTA logo

CRTA

CRTP logo

CRTP

ADF logo

ADF

ISC2-CC logo

ISC2

OSCP Security logo

OSCP

SC-200 logo

SC-200

Security+ logo

Security+

SCCU logo

SCCU