Capabilities
Koan Ventures offers a comprehensive suite of capabilities in the cyber security domain.
Vulnerability Assessment and Penetration Testing services
We can identify security weaknesses and vulnerabilities by using industry standard tools and guidelines.
Security Information and Event Management (SIEM)
Our Analyzer suite of tools meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log forensics, event correlation, real-time alerting, file integrity monitoring, log analysis, user activity monitoring, object access auditing, compliance reporting, and log retention.
Incident response
Managing Vulnerability reports and alerts can be a daunting task, more so for a small or medium sized business. We offer Incident Response services as an add-on to our other security assessment service or as a separate offering.
User Behaviour Analytics (UBA)
We detect unknown threats and anomalous behavior using Splunk or industry leading toolsets.
Implement Security Operations Center (SOC)
We offer to build and operate an end to end center for our clients to:
Security Consulting
We have the expertise in designing security protocols, secure software products and architecture. We work with product architecture and development teams in our client organizations to build secure solutions.
Vulnerability Assessment and Penetration Testing services
We can identify security weaknesses and vulnerabilities by using industry standard tools and guidelines.
Security Information and Event Management (SIEM)
Our Analyzer suite of tools meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log forensics, event correlation, real-time alerting, file integrity monitoring, log analysis, user activity monitoring, object access auditing, compliance reporting, and log retention.
Incident response
Managing Vulnerability reports and alerts can be a daunting task, more so for a small or medium sized business. We offer Incident Response services as an add-on to our other security assessment service or as a separate offering.
User Behaviour Analytics (UBA)
We detect unknown threats and anomalous behavior using Splunk or industry leading toolsets.
Implement Security Operations Center (SOC)
We offer to build and operate an end to end center for our clients to:
- Detect and respond to threats, keeping the information held on systems and networks secure
- Increase resilience by learning about the changing threat landscape (both malicious and non-malicious, internal and external)
- Identify and address negligent or criminal behaviours
- Derive business intelligence about user behaviours in order to shape and prioritise the development of technologies
Security Consulting
We have the expertise in designing security protocols, secure software products and architecture. We work with product architecture and development teams in our client organizations to build secure solutions.