Call now: +49 89 538863-0

Sprache:

Skaylink Cyber Security Center

The turnkey expert solution to protect your IT and defend against cyber attacks

Why is cyber security more important now than ever?

  • Companies around the world are currently facing a rapidly evolving cyber threat landscape.
  • 67 percent of CSOs/CISOs (German-speaking region: Germany, Austria, Switzerland) report that their company has at least experienced one cyber attack in the last twelve months.*
  • 33 percent say that their company has been the target of multiple attacks.*
  • The consequences are serious: Those affected must fear the loss of sensitive information, disruption to their business and operations, damage to their brand and reputation, the loss of regular customers and revenue.
  • But: Only 24 percent of the CSOs/CISOs surveyed in the German-speaking region are absolutely certain that their company is prepared for a cyber attack.

In our digital age, it is less a question of WHETHER you will also be attacked, but rather WHEN. Cyber security is more important than ever – but many companies do not have the internal know-how to protect themselves adequately.

* Source: “People-Centric Cybersecurity” – a survey of IT security managers in Germany, Austria and Switzerland (DACH), conducted by techconsult on behalf of Proofpoint.

Our solution – the Skaylink Cyber Security Center!

The Skaylink Cyber Security Center is a cloud-native security operations center that reliably protects you from cyber attacks. Different service packages guarantee protection tailored to your needs. Comprehensive assessments ensure that you are always up to date on all incidents.

What can you expect from our Skaylink Cyber Security Center?

  • Out-of the box cloud-based solution
  • Simple and transparent pricing model
  • Proven technical foundation (Microsoft Sentinel)
  • Certified and experienced Skaylink security experts
  • 20 years of mid-market and enterprise experience
  • Short onboarding time

Was does the Skaylink Cyber Security Center offer?

Example of our Security Report

Dashboard

These renowned companies already rely on our solution

Technology used

Microsoft Defender for Endpoint

The optimal enterprise endpoint security platform for Windows clients and servers, Linux, macOS, and Android (iOS/iPadOS coming soon)

Microsoft Defender for Identity

Hybrid is the best. Signals from your on-premises Active Directory also help to defend against threats.

Microsoft Defender for Office 365

Protection against threats from emails, links and malware

Microsoft Defender for Cloud Apps

Shadow IT detection and (multi-)cloud app governance are no problem for this cloud access security broker.

Azure AD Identity Protection

Detects identity-based risks while supporting the zero-trust approach of the Microsoft Entra ID.

Microsoft Information Protection

Classifies and/or encrypts files and emails in order to prevent uncontrolled data leakage.

Pricing models

Essential

Ideal as an entry-level package for organizations of any size (even microenterprises) that want to monitor their IT professionally. Take the first step towards advanced cyber defense! “Essential” gives you all the basic monitoring features you need.

Services

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity security monitoring – MS Entra ID¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – Bitdefender GravityZone²
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Security operations report

Identity

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity security monitoring – MS Azure AD¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – Bitdefender GravityZone²
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Security operations report

Endpoint

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity Security Monitoring – MS Azure AD¹
  • Endpoint Security Monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – Bitdefender GravityZone²
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Security operations report

Notes
 Included, automated service; human processing only during booked service hours
¹ If covered by the customer’s license, based on license-related features
² Event Collector instance, license, and Customer Log Analytics Workspaces required

Professional

The Professional packages offer you room for development and are suitable for companies that wish comprehensive security monitoring including extensive reporting. With the Platinum+ offering, you get an “all-round carefree package” with phone support whenever you need it – 24 hours a day, seven days a week.

Services

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity security monitoring –
    MS Entra ID¹
  • Endpoint security monitoring –
    MS Defender for Endpoint¹
  • Endpoint security monitoring –
    MS Defender for Cloud¹
  • Endpoint security monitoring –
    Bitdefender GravityZone²
  • Cloud app monitoring¹
  • Office 365 monitoring¹
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Phone alerting
  • Cyber Security Center jour fixe
  • Security configuration recommendations
  • Ticketing system API integration³
  • Security operations report
  • Security threat report
  • Security posture report
  • Managed device status report¹
  • Network security report (firewall)⁴

Silver

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity security monitoring – MS Azure AD¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – MS Defender for Cloud¹
  • Endpoint security monitoring – Bitdefender GravityZone²
  • Cloud app monitoring¹
  • Office 365 monitoring¹
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Phone alerting
  • Cyber Security Center jour fixe
  • Security configuration recommendations
  • Ticketing system API integration³
  • Security operations report
  • Security threat report
  • Security posture report
  • Managed device status report¹
  • Network security report (firewall)⁴

Gold⁵

  • Availability of the Skaylink Cyber Security Center​
  • Technical 24/7 incident monitoring and alerting​
  • Identity security monitoring – MS Azure AD¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – MS Defender for Cloud¹
  • Endpoint Security Monitoring – Bitdefender GravityZone²
  • Cloud app monitoring¹
  • Office 365 monitoring¹
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Phone alerting
  • Cyber Security Center jour fixe
  • Security configuration recommendations
  • Ticketing system API Integration³
  • Security operations report
  • Security threat report
  • Security posture report
  • Managed device status report¹
  • Network security report (firewall)⁴

Platinum

  • Availability of the Skaylink Cyber Security Center
  • 24/7 technical incident monitoring and alerting
  • Identity security monitoring – MS Azure AD¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint Security Monitoring – MS Defender for Cloud¹
  • Endpoint Security Monitoring – Bitdefender GravityZone²
  • Cloud app monitoring¹
  • Office 365 monitoring¹
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Phone alerting
  • Cyber Security Center jour fixe
  • Security configuration recommendations
  • Ticketing system API integration³
  • Security operations report
  • Security threat report
  • Security posture report
  • Managed device status report¹
  • Network security report (firewall)⁴

Platinum+

  • Availability of the Skaylink Cyber Security Center​
  • Technical 24/7 incident monitoring and alerting​
  • Identity security monitoring – MS Azure AD¹
  • Endpoint security monitoring – MS Defender for Endpoint¹
  • Endpoint security monitoring – MS Defender for Cloud¹
  • Endpoint Security Monitoring – Bitdefender GravityZone²
  • Cloud app monitoring¹
  • Office 365 monitoring¹
  • Reaction time to critical incidents
  • Cyber Security Center analyst assessment
  • Phone hotline
  • Email alerting
  • Phone alerting
  • Cyber Security Center jour fixe
  • Security configuration recommendations
  • Ticketing system API Integration³
  • Security operations report
  • Security threat report
  • Security posture report
  • Managed device status report¹
  • Network security report (firewall)⁴

Notes
Included, automated service; human processing only during booked service hours
¹ If covered by the customer’s software license; based on license-related features
² Event Collector Instance, license, and Customer Log Analytics workspaces required
³ Prerequisite: interface to ticket system of customer supported by SIEM system
⁴ Provided that the firewall is monitored
Our recommendation

Do you want to protect your business from cyber attacks? Then schedule your consultation today!

FAQ

The Skaylink Cyber Security Center is a cloud-native security operations center. It monitors and analyzes security-relevant events in the customer’s environment and can take immediate action.

  • Login from an atypical country (can also just be the end of a VPN tunnel) 
  • Fast switch of login location (Europe, and then Asia 10 minutes later) 
  • Repeated creation and deletion of accounts 
  • Assignment of administrative rights to standard accounts 
  • Discovery of software for criminal data encryption (ransom software)  
  • Components that can be infiltrated based on open source (Log4J) 
  • Unusual data transfer 

The Skaylink Cyber Security Center (CSC) offers a modular set of different packages and products. Basically, there are two options available: Essential and Professional. In addition, the CSC offers packages for awareness & training, vulnerability management and cloud security workshops.

Essential: 

  • MDE Plan 1 oder Plan 2 
  • GravityZone Bitdefender
  • Azure AD Premium P1 / P2

Professional: 

  • MDE Plan 1 or Plan 2 
  • GravityZone Bitdefender 
  • + 1 additional Defender product 

The rollout is divided into three phases. First, the platform is technically connected during the onboarding phase. Then, in the ramp-up phase, the system is trained and the monitoring parameters are fine-tuned. Once this phase is complete, the “Active Operations” phase” begins, during which regular operations are carried out. 

After rollout, your environment is monitored for anomalies and incidents. Confirmed incidents are analyzed and possible immediate measures are initiated. You also receive ongoing reports on the health of your environment and recommendations for improving your security posture.

No! Response, increased IT security via workshops, attack simulation, reports and more are included in our product.

Depending on the size, different products can be used. The service can basically be used starting with one seat.

The price is calculated per user per month, depending on which plan meets the customer’s needs and the dedicated infrastructure instances (firewall). 

We’d be happy to advise you on all security issues. Click here for our offer: Security & Compliance Assessments 

  • Microsoft 365 traffic 
  • Azure activity logs (VM, storage, network etc.) 
  • AWS 
  • Log ingestion via Syslog, etc. 
  • Defender for Cloud (also for on-premises infrastructure) 
  • DNS logs 
  • Event logs 
  • Threat intelligence/TAXI 

How to successfully detect and eliminate vulnerabilities

Here are two examples of how the Skaylink Cyber Security Center can help you. 

Incident: Data leakage to a cloud app that isn’t used

Incident: An account generates an “Impossible Travel” incident

Video (currently only available in German)

YouTube

By loading the video, you agree to YouTube's privacy policy.
Learn more

Load video

PGlmcmFtZSB3aWR0aD0iODUzIiBoZWlnaHQ9IjQ4MCIgc3JjPSJodHRwczovL3d3dy55b3V0dWJlLW5vY29va2llLmNvbS9lbWJlZC9iM3JDU20wenZWUT9yZWw9MCZjb250cm9scz0wJnNob3dpbmZvPTAiIGZyYW1lYm9yZGVyPSIwIiBhbGxvd2Z1bGxzY3JlZW4+PC9pZnJhbWU+

Information to download

Skaylink Cyber Security Center – Managed Service 24/7

We have compiled all the facts on the Skaylink Cyber Security Center and its benefits here in a clearly arranged overview.

Contact our experts