Skip to main content

Data Security Design and Implementation Service for ECS

Overview

Certified Superna technicians will assist customers with advanced design and implementation of the Data Security Bundle (Ransomware Defender feature). This service includes best practice configuration and recommendations to suit each customer environment as they implement the Ransomware Defender solution, as well as additional configuration and integrations for SecOPS teams. Integrations with SIEM, SOAR, and email routing are configured.

Dell SKU: AD154081 | Superna Product Code: EYEGLASS-P032

  • Service Delivery: Remote sessions for audio, video, and screen sharing via Zoom, VPN, or alternate remote access to the customer's ECS equipment.
  • Operating Hours: Monday to Friday, 9 am – 4 pm in your local time zone, excluding major holidays.
  • Terms and Conditions:
  • Exclusions:
    • Superna resources are not authorized to provide design recommendations for Disaster Recovery features.
    • Hands-on changes to external IT components, such as DNS, Active Directory, ECS, or other non-Superna supplied products.
    • Service delivery requires customers to have hands-on knowledge of all external IT components and decision-making on production customer data.

Service Methodology Flow

Collection and Planning Phase

  • Implementation overview.
  • Environment health review: assessing the customer's risk profile.
  • Determining and documenting threat response settings to meet the customer's risk profile.
  • Reference the final ECA Installation Report (from original deployment).

Configuration Phase

  • Implement threshold setting recommendations.
  • Configure monitor and ignore lists.
  • Alert integration into SIEM tools via Zero Trust API integration.
  • Syslog forwarding configuration (optional).
  • Custom email routing configuration for SecOPS teams.
  • Simulated test with honeypot tripwire feature.

Knowledge Transfer

  • Deep dive on threat detection.
  • How to respond to a false positive event.
  • How to respond to and recover from a real ransomware event.
  • Hands-on data recovery testing (only if Bucket versioning is enabled in ECS).

Service Complete: Deliver updated ECA Installation Report.