Skaylink Cyber Security Center
The turnkey expert solution to protect your IT and defend against cyber attacks
Why is cyber security more important now than ever?
- Companies around the world are currently facing a rapidly evolving cyber threat landscape.
- 67 percent of CSOs/CISOs (German-speaking region: Germany, Austria, Switzerland) report that their company has at least experienced one cyber attack in the last twelve months.*
- 33 percent say that their company has been the target of multiple attacks.*
- The consequences are serious: Those affected must fear the loss of sensitive information, disruption to their business and operations, damage to their brand and reputation, the loss of regular customers and revenue.
- But: Only 24 percent of the CSOs/CISOs surveyed in the German-speaking region are absolutely certain that their company is prepared for a cyber attack.
In our digital age, it is less a question of WHETHER you will also be attacked, but rather WHEN. Cyber security is more important than ever – but many companies do not have the internal know-how to protect themselves adequately.
* Source: “People-Centric Cybersecurity” – a survey of IT security managers in Germany, Austria and Switzerland (DACH), conducted by techconsult on behalf of Proofpoint.
Our solution – the Skaylink Cyber Security Center!
The Skaylink Cyber Security Center is a cloud-native security operations center that reliably protects you from cyber attacks. Different service packages guarantee protection tailored to your needs. Comprehensive assessments ensure that you are always up to date on all incidents.
What can you expect from our Skaylink Cyber Security Center?
- Out-of the box cloud-based solution
- Simple and transparent pricing model
- Proven technical foundation (Microsoft Sentinel)
- Certified and experienced Skaylink security experts
- 20 years of mid-market and enterprise experience
- Short onboarding time
Was does the Skaylink Cyber Security Center offer?
These renowned companies already rely on our solution
Technology used
Microsoft Defender for Endpoint
The optimal enterprise endpoint security platform for Windows clients and servers, Linux, macOS, and Android (iOS/iPadOS coming soon)
Microsoft Defender for Identity
Hybrid is the best. Signals from your on-premises Active Directory also help to defend against threats.
Microsoft Defender for Office 365
Protection against threats from emails, links and malware
Microsoft Defender for Cloud Apps
Shadow IT detection and (multi-)cloud app governance are no problem for this cloud access security broker.
Azure AD Identity Protection
Detects identity-based risks while supporting the zero-trust approach of the Microsoft Entra ID.
Microsoft Information Protection
Classifies and/or encrypts files and emails in order to prevent uncontrolled data leakage.
Pricing models
Essential
Ideal as an entry-level package for organizations of any size (even microenterprises) that want to monitor their IT professionally. Take the first step towards advanced cyber defense! “Essential” gives you all the basic monitoring features you need.
Services
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity security monitoring – MS Entra ID¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – Bitdefender GravityZone²
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Security operations report
Identity
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity security monitoring – MS Azure AD¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – Bitdefender GravityZone²
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Security operations report
Endpoint
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity Security Monitoring – MS Azure AD¹
-
Endpoint Security Monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – Bitdefender GravityZone²
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Security operations report
Notes Included, automated service; human processing only during booked service hours
¹ If covered by the customer’s license, based on license-related features
² Event Collector instance, license, and Customer Log Analytics Workspaces required
Professional
The Professional packages offer you room for development and are suitable for companies that wish comprehensive security monitoring including extensive reporting. With the Platinum+ offering, you get an “all-round carefree package” with phone support whenever you need it – 24 hours a day, seven days a week.
Services
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity security monitoring –
MS Entra ID¹ -
Endpoint security monitoring –
MS Defender for Endpoint¹ -
Endpoint security monitoring –
MS Defender for Cloud¹ -
Endpoint security monitoring –
Bitdefender GravityZone² -
Cloud app monitoring¹
-
Office 365 monitoring¹
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Phone alerting
-
Cyber Security Center jour fixe
-
Security configuration recommendations
-
Ticketing system API integration³
-
Security operations report
-
Security threat report
-
Security posture report
-
Managed device status report¹
-
Network security report (firewall)⁴
Silver
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity security monitoring – MS Azure AD¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – MS Defender for Cloud¹
-
Endpoint security monitoring – Bitdefender GravityZone²
-
Cloud app monitoring¹
-
Office 365 monitoring¹
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Phone alerting
-
Cyber Security Center jour fixe
-
Security configuration recommendations
-
Ticketing system API integration³
-
Security operations report
-
Security threat report
-
Security posture report
-
Managed device status report¹
-
Network security report (firewall)⁴
Gold⁵
-
Availability of the Skaylink Cyber Security Center
-
Technical 24/7 incident monitoring and alerting
-
Identity security monitoring – MS Azure AD¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – MS Defender for Cloud¹
-
Endpoint Security Monitoring – Bitdefender GravityZone²
-
Cloud app monitoring¹
-
Office 365 monitoring¹
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Phone alerting
-
Cyber Security Center jour fixe
-
Security configuration recommendations
-
Ticketing system API Integration³
-
Security operations report
-
Security threat report
-
Security posture report
-
Managed device status report¹
-
Network security report (firewall)⁴
Platinum
-
Availability of the Skaylink Cyber Security Center
-
24/7 technical incident monitoring and alerting
-
Identity security monitoring – MS Azure AD¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint Security Monitoring – MS Defender for Cloud¹
-
Endpoint Security Monitoring – Bitdefender GravityZone²
-
Cloud app monitoring¹
-
Office 365 monitoring¹
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Phone alerting
-
Cyber Security Center jour fixe
-
Security configuration recommendations
-
Ticketing system API integration³
-
Security operations report
-
Security threat report
-
Security posture report
-
Managed device status report¹
-
Network security report (firewall)⁴
Platinum+
-
Availability of the Skaylink Cyber Security Center
-
Technical 24/7 incident monitoring and alerting
-
Identity security monitoring – MS Azure AD¹
-
Endpoint security monitoring – MS Defender for Endpoint¹
-
Endpoint security monitoring – MS Defender for Cloud¹
-
Endpoint Security Monitoring – Bitdefender GravityZone²
-
Cloud app monitoring¹
-
Office 365 monitoring¹
-
Reaction time to critical incidents
-
Cyber Security Center analyst assessment
-
Phone hotline
-
Email alerting
-
Phone alerting
-
Cyber Security Center jour fixe
-
Security configuration recommendations
-
Ticketing system API Integration³
-
Security operations report
-
Security threat report
-
Security posture report
-
Managed device status report¹
-
Network security report (firewall)⁴
Notes Included, automated service; human processing only during booked service hours
¹ If covered by the customer’s software license; based on license-related features
² Event Collector Instance, license, and Customer Log Analytics workspaces required
³ Prerequisite: interface to ticket system of customer supported by SIEM system
⁴ Provided that the firewall is monitored
⁵ Our recommendation
Do you want to protect your business from cyber attacks? Then schedule your consultation today!
FAQ
What is the Skaylink Cyber Security Center (CSC)?
The Skaylink Cyber Security Center is a cloud-native security operations center. It monitors and analyzes security-relevant events in the customer’s environment and can take immediate action.
As of today, what does the Cyber Security Center detect right out of the box?
- Login from an atypical country (can also just be the end of a VPN tunnel)
- Fast switch of login location (Europe, and then Asia 10 minutes later)
- Repeated creation and deletion of accounts
- Assignment of administrative rights to standard accounts
- Discovery of software for criminal data encryption (ransom software)
- Components that can be infiltrated based on open source (Log4J)
- Unusual data transfer
What products are available?
The Skaylink Cyber Security Center (CSC) offers a modular set of different packages and products. Basically, there are two options available: Essential and Professional. In addition, the CSC offers packages for awareness & training, vulnerability management and cloud security workshops.
From the viewpoint of Microsoft, what licenses are required at a minimum?
- MDE Plan 1 oder Plan 2
- GravityZone Bitdefender
- Azure AD Premium P1 / P2
- MDE Plan 1 or Plan 2
- GravityZone Bitdefender
- + 1 additional Defender product
How is the Skaylink Cyber Security Center rolled out?
The rollout is divided into three phases. First, the platform is technically connected during the onboarding phase. Then, in the ramp-up phase, the system is trained and the monitoring parameters are fine-tuned. Once this phase is complete, the “Active Operations” phase” begins, during which regular operations are carried out.
What happens after the Skaylink Cyber Security Center rollout?
After rollout, your environment is monitored for anomalies and incidents. Confirmed incidents are analyzed and possible immediate measures are initiated. You also receive ongoing reports on the health of your environment and recommendations for improving your security posture.
Does the Skaylink Cyber Security Center only consist of security monitoring?
No! Response, increased IT security via workshops, attack simulation, reports and more are included in our product.
As of what size can I book the Skaylink Cyber Security Center?
Depending on the size, different products can be used. The service can basically be used starting with one seat.
How is the price calculated?
The price is calculated per user per month, depending on which plan meets the customer’s needs and the dedicated infrastructure instances (firewall).
Are security workshops offered without a Skaylink Cyber Security Center contract?
We’d be happy to advise you on all security issues. Click here for our offer: Security & Compliance Assessments
Which integration components does the Skaylink CSC offer?
- Microsoft 365 traffic
- Azure activity logs (VM, storage, network etc.)
- AWS
- Log ingestion via Syslog, etc.
- Defender for Cloud (also for on-premises infrastructure)
- DNS logs
- Event logs
- Threat intelligence/TAXI
How to successfully detect and eliminate vulnerabilities
Here are two examples of how the Skaylink Cyber Security Center can help you.
Incident: Data leakage to a cloud app that isn’t used
Goal: Stop data leakage
Without the Skaylink Cyber Security Center:
- Cloud App Security detects the incident.
- An alert is generated.
- No further actions are triggered.
→ Data leakage continues
With the Skaylink Cyber Security Center:
- CSC detects the incident.
- An automatic runbook is activated to gather information and check if the cloud app is enabled or not.
- As it is not enabled, the client of the user is isolated and/or the user account is blocked.
- A customer notification demands a reaction (note incident, unblock user, check cloud app).
- After customer feedback, the CSC configuration is automatically adjusted (here: blocklisting of app or app + specific user).
→ Other data leaks are prevented
Incident: An account generates an “Impossible Travel” incident
Goal: Suppress false positive
Without the Skaylink Cyber Security Center:
- Microsoft 365 detects the incident and alerts are generated.
- The login risk level is raised.
- Depending on the configuration, multi-factor authentication (MFA) is requested for the login.
→ Incident will occur again and again.
With Skaylink Cyber Security Center:
- Same initial sequence as without the Cyber Security Center
But then:
- Cyber Security Center checks the other activities of the user to assess the incident.
- The customer notification demands a reaction (assessment of IP address: belongs to company yes/no).
- After customer feedback, the Cyber Security Center configuration is automatically adjusted (here: add the IP address to the Cyber Security Center configuration and other systems).
→ Further alerts are suppressed
Video (currently only available in German)
By loading the video, you agree to YouTube's privacy policy.
Learn more
Information to download
Skaylink Cyber Security Center – Managed Service 24/7
We have compiled all the facts on the Skaylink Cyber Security Center and its benefits here in a clearly arranged overview.