[R.E.D.]
We rely on RIEDEL Enterprise Defense
With RIEDEL Enterprise Defense [R.E.D.], we offer a holistically managed security concept that protects companies around the clock. Our Managed SIEM & SOC is active 24/7 and ensures the continuous recording and correlation of security-relevant events. By using threat intelligence and tailored use cases, we detect threats at an early stage and respond automatically with proven playbooks. Escalation takes place in accordance with defined service level agreements (SLAs) so that critical incidents are addressed quickly and in a targeted manner. Transparent reports and meaningful KPIs round off the offering and provide clarity about the security situation of your network - at all times and in a comprehensible manner.
What you can expect
Our [R.E.D.] continuously correlates signals from the network, endpoints, cloud and SaaS applications. Our system detects security events at an early stage and reacts around the clock - automatically and efficiently. You benefit from holistic protection that not only detects threats, but also actively mitigates them.
-
Log recording
Data sources are recorded, standardized and weighted according to relevance. In the process, [R.E.D.] identifies potential gaps in security monitoring and reports them transparently. This creates a complete picture of the situation that enables targeted measures to be taken and strengthens the resilience of your IT infrastructure.
-
Use cases and correlation
Standard and customer-specific use cases are covered. Through intelligent correlation, [R.E.D.] condenses incoming signals into meaningful alarms - reducing false positives and creating clarity. This gives you exactly the information you need to make quick and well-founded decisions.
-
Threat Intel
Threat intelligence feeds continuously provide indicators for potential threats. The insights gained flow directly back into existing rules and playbooks, enabling dynamic adaptation of security mechanisms and continuous optimization of response processes.
-
Response and automation
SOAR orchestrates automated measures and significantly shortens response times. All communication steps and relevant evidence remain consistently traceable, for maximum transparency and seamless documentation in the incident response process.
[R.E.D.] is based on the existing customer environment.
Detection & Response
24/7 Monitoring
Use Case Library
Industry-relevant use cases
SOAR Automation
Automated execution of predefined measures
Executive reporting
Regular insights into the security situation, trends and KPIs
Technology in detail
Centralized threat detection:
A SIEM collects and correlates data from network, endpoints, cloud and SaaS, for a clear situational picture and informed decisions.
Playbook response:
Analysts in the SOC check alarms around the clock and respond according to defined processes, in a structured, traceable and prioritized manner.
Modularly expandable:
SOAR accelerates approved processes, EDR+ deepens end device integration. Integration into existing systems is coordinated on the project side.
Transparency & controllability:
Executive reports show maturity level and development, technical reports provide concrete measures, continuous improvement included.
IT Security
Comprehensive protection
Our solutions offer managed services with 24/7 monitoring, configuration management and incident handling. They are individually tailored to your infrastructure and are optimally prepared for hybrid and multicloud-capable corporate networks.
Prices
Our RIEDEL Enterprise Defense[R.E.D.] Security Suite is available in various sizes. The fixed price is simply based on the number of endpoints (and not on EPS or other incalculable parameters). An endpoint is any type of device that is included in the monitoring (computer, smartphone, switch, router, server, etc.).
We would also be happy to provide you with a concrete offer that is tailored precisely to the size of your network and your specific requirements. Just get in touch with us!
*incl. 90 days retention time (hot) and 12 months archive (cold)
*incl. 90 days retention time (hot) and 12 months archive (cold)
*incl. 90 days retention time (hot) and 12 months archive (cold)
*incl. 90 days retention time (hot) and 12 months archive (cold)
The [R.E.D.] packages start at XXS for environments with less than 50 devices and range up to XXXL for large networks with over 5,000 devices. So you will find the right solution for any size of company. Please contact us for individual price offers and further information.
Frequently asked questions
Here are some of the most frequently asked questions we receive.
-
Can I buy just the SIEM?
No, our RIEDEL Enterprise Defense solution is a managed service in which the provision of our service in the form of continuous monitoring of the network, the further development of automation based on customer-specific use cases and other aspects are part of the service.
-
Can other sources / tools be integrated?
Yes, our solution is designed in such a way that we can also integrate and monitor other tools and sources that are already present in your security stack. If you already have a firewall, an EDR system or other solutions in use, please contact us.
-
Which sources are used to detect malware and vulnerabilities?
Our solution'sthreat intelligence is populated by 32 independent feeds / sources.
Feeds contain indicators that can be automatically imported into MISP at regular intervals, which can be both remote and local resources.
Such indicators contain a pattern that can be used to detect suspicious or malicious cyber activity.
-
Is additional hardware required?
Depending on the size of the customer's network and the planned setup, our log aggregators (Hydras) are integrated as VMs (virtual machines) or as mini-server.
-
What advantages does [R.E.D.] offer compared to other solutions?
-
Round-the-clock monitoring and response to incidents by German-speaking SOC staff
-
Customized playbooks and reports for maximum transparency
-
Automation by SOAR for fast response times
-
Hosting & operation in Germany, 100% GDPR, NIS2 and ISO27001-compliant
-
Clear cost structure thanks to modular service packages
-
-
How does onboarding work?
Onboarding usually takes 6-8 weeks. This involves analyzing vulnerabilities, adapting the solution to your environment, installing the necessary tools (e.g. Log Collector, XDR Agent) and evaluating network activity. This is followed by the activation of continuous monitoring
-
Do I need to replace my existing IT infrastructure?
No. [R.E.D.] builds on your existing environment and integrates flexibly into existing systems and processes.
-
Does [R.E.D.] also support regulatory requirements?
Yes, [R.E.D.] is fully GDPR, NIS2 and ISO27001 compliant and supports companies with other standards such as PCI DSS, NIST 800-53, TSC or HIPAA
-
How transparent is the system for me as a customer?
You receive regular reports, meaningful KPIs and access to a dashboard. There is no black box technology - you retain control of your security situation at all times
Get started today!
Our Solution Architects will be happy to have an initial discussion with you. When it comes to IT security, one basic rule applies: it's always better to start than to put it off!