BlueHat Cyber Services Roadmap

Phase 1 2 3 4 5
Endpoint Security and Vulnerability Management
Vulnerability management (quarterly, monthly, or bi-weekly) check check check check check
Enterprise anti-virus check check check check check
Basic reporting check check check
Application whitelisting check check
Device control (remote USB lockout) check check
Compliance reporting check check
Enterprise DNS Protection
Predictive security on all devices check check check check check
Prevent malware, phishing and C2 callbacks check check check check check
Enforces acceptable use policies check check check check check
Block malicious domain threats (DNS and IP layer) check check check check check
Identify targeted attacks check check check check check
Real-time, enterprise wide activity searches and reporting check check check check check
Managed Security Information and Event Management
Security, order network, and DMZ device logs check check check check
Threat intelligence check check check check
Monthly reporting check check check check
Server and service availability check check check
Network intrusion detection) check check check
Database log collection check check check
Vulnerability testing check check
Host IDS check check
Wireless IDS check check
Host configuration testing check check
File integrity monitoring check check
Security incident response check check
Risk mitigation check check
Compliance reporting check check
Enterprise Managed DNs
DDOS attack protection check check check check check
DNS reporting check check check check check
Globally distributed DNS check check check check
Charged by QPM check check check check check
Traffic reporting check check
Server Management
Downtime response check check check check check
OS patches and updates check check check check check
Health monitoring check check check check check
Service monitoring check check check check check
Security/vulnerability scanning) check check check
Server optimization check check check
Exchange / email system monitoring check check check
SQLmonitoring check check check
24/7 critical support check check
Storage management check check
OS hardening check check
Performance optimization check check
Blacklist monitoring and management check check
Website monitoring check check
Network Management
Network monitoring SNMP, Netflow* and sFlow* check check check check check
IOS and firmware patch management check check check check check
Connectivity troubleshooting and monitoring check check check
Troubleshooting and problem resolution check check check
Performance and availability management check check check
Network utilization capacity management check check
Preventive notification, trend and root cause analysis check check
Bandwidth utilization and QOS management check check
ISP circuit and outage management check check
Reporting
Enterprise ticketing portal check check check check check
Executive summary reports check check check check check
Performance summary reports check check check
Detailed performance reports check check
Utilization reports for capacity planning check check
Uptime statistic reports check check
Compliance Reporting check
Compliance Auditing and Monitoring
Configuration monitoring and management check
File integrity monitoring check
Activity monitoring and management check
Change monitoring and management check
Compliance auditing and reporting check

Not Sure Where To Start?