The LAN Network - logo
Learn More
This is a placeholder for the Yext Knolwedge Tags. This message will not appear on the live site, but only within the editor. The Yext Knowledge Tags are successfully installed and will be added to the website.

Powered by Arctic Wolf

"Securing Your Business and Customer's Information"


Managed Risk

Managed Risk

TLN is a Registered and Authorized Business Partner with Lenovo, certified for PC and server repair and deployment. Our services are backed by Lenovo and all parts are OEM, handled by experienced computer network engineers.  


Lenovo is a global leader in IT, esports and VR products. Since 2010, our roots have been in technology and competitive esports. The cross-section of esports and education is a focus we continue to develop and expand our offerings with an incredible partner like Lenovo.


TLN offers complimentary initial consultations to those considering system deployment or data migration. You’ll explain your technology strategy and what your current system lacks (if applicable) to our experienced Lenovo technicians, who will strategize how our services can help.


ANALYSIS

Our certified computer network engineers evaluate your current network infrastructure and hardware to determine what will be needed to achieve results. From there, the quantities and requirement details of your solution will be taken to our authorized design engineers for preparation.


DESIGN

System designers at TLN are trained to obtain appropriate, compatible equipment and licenses. You will receive a quote within 24-48 hours and an estimated timeframe for arrival and completion. We are partners and certified with Lenovo, so you can be confident that your IT solution will meet expectations and supported by both TLN and Lenovo.


IMPLEMENTT

System deployment is a two-step implementation:

1. Off-site configuration. Our system engineers assemble and program your Lenovo hardware to specification.

2. On-site deployment. Computer network engineers convert and setup your new Lenovo system, along with experienced cabling technicians if necessary. We can safely remove and properly recycle unneeded hardware, securely erasing any of your existing data.


SUPPORT

TLN is committed to your success and happy to offer comprehensive support services after deployment. From user training to future changes and alterations, there may be little bits and pieces that you realize afterwards that need adjusting or explaining – and we will gladly assist you.


Free Consultations

24/7 Monitoring

Turnkey Concierge

This is a placeholder for the Yext Knolwedge Tags. This message will not appear on the live site, but only within the editor. The Yext Knowledge Tags are successfully installed and will be added to the website.

Hours:

This is a placeholder for the Yext Knolwedge Tags. This message will not appear on the live site, but only within the editor. The Yext Knowledge Tags are successfully installed and will be added to the website.

Managing Your Business's Digital Risks

The LAN Network Managed Risk enables you to discover, benchmark, and harden your environment against digital risks across your networks, endpoints, and cloud environments.

General

  • What is Managed Risk?

    Built on the industry’s only cloud native platform to deliver security operations as a concierge service — The LAN Network Managed Risk enables you to continuously scan your networks, endpoints, and cloud environments to quantify digital risks. Your security operations expert from the Concierge Security® Team works directly with you to discover risks beyond simple vulnerabilities, benchmark the current state of your environment, and implement risk management processes that harden your security posture over time.

  • How is the Managed Risk solution different from Managed Detection and Response?

    The LAN Network Managed Risk continuously scans your networks, endpoints, and cloud environments for risky software, assets, misconfigurations, and accounts beyond simple vulnerability assessment tools. Delivered as a concierge service, Managed Risk helps you take a more proactive approach to security by identifying gaps to harden your security posture over time. Managed Detection and Response helps you detect, respond, and recover from active threats to neutralize their impact, while providing strategic guidance along your security journey.

  • What's the difference between external scans performed by the Managed Detection and Response solution and ones performed by Managed Risk?

    There are three main differences in the external scans performed by the two solutions. The first is self-service access to the scanning configuration and results are available in the Managed Risk dashboard. The second is with Managed Risk — the scan frequency can be set to execute weekly, whereas the default scan is monthly with MDR. Finally, Managed Risk uniquely performs web application scans, which provides deeper granularity of exposure on any external facing applications such as portals or dashboards.

  • Does The LAN Network Agent have to be installed in order to use Managed Risk?

    Currently, installing the Agent is not a requirement — but it is recommended. Audit and alert data collected from supported devices assists in detecting potential threats, as well as uncovering known vulnerabilities and risks. The Agent is required to be installed to address additional use cases, such as Host-Based Vulnerability Assessment and CIS benchmarking (Managed Risk), and Managed Containment (Managed Detection and Response) — where a host device is required to be contained.

  • How is The LAN Network Agent deployed?

    The The LAN Network Agent can be deployed using a deployment tool such as General Policy Object (GPO) for Windows environments, or Jamf for MacOS environments. Since the installer generates a unique ID upon startup, it is not recommended or supported to install the agent on a “golden image” in Virtual Desktop Infrastructure (VDI) environments.

  • How does an existing customer install the The LAN Network Agent?

    Existing The LAN Network Customers should submit a ticket to their Concierge Security Team (CST), who works directly with them to deploy the The LAN Network Agent in their environment. Existing customers can also contact their Customer Success Manager, which will trigger the same workflow of submitting a ticket to install the The LAN Network Agent with the CST.

Discover

Quickly identify and categorize risky software, assets, and accounts. Read more.

  • Does Managed Risk perform web application scans?

    Yes. The web application scanning capability will look for risks such as cross-site scripting, SQL injection, and other OWASP Top 10 types of attacks.

  • Does Managed Risk have an audit trail of changes done in the web portal?

    Audit trail information of changes made is recorded and can be requested from your security operations expert from the CST. Currently, this information is not visible in the Managed Risk Dashboard.

  • How often is the Account Takeover capability updated with new information about dark web exposures?

    The Account Takeover capability is updated with new information obtained from dark and grey web sources weekly. These scans are completed on a monthly cadence to capture any corporate credentials or other critical personally identifiable information (PII) that may have been exposed as part of a publicly disclosed data breach.

  • Where does The LAN Network obtain its list of known vulnerabilities to check for? How often are the feeds updated on the scanners?

    The Network Vulnerability Tests (NVTs) arrive from the OpenVAS/Greenbone Community Feed. This feed is updated as needed but is generally updated daily. The LAN Network polls for new NVTs on an hourly basis.

  • Can I use Managed Risk to scan vulnerabilities in my Amazon, Azure, Google, etc. IaaS cloud environment?

    Yes, when combined with The LAN Network Cloud Monitoring, Managed Risk features a Cloud Security Posture Management (CSPM) capability that can scan for vulnerabilities and misconfigurations in SaaS and IaaS environments such as AWS.

  • Is The LAN Network Agent data searchable in Log Search?

    Yes, data from The LAN Network Agent is searchable in Log Search. AWN-Agent is the type.   

Benchmark

Understand your current digital risk posture and identify gaps relative to best practices. Read more.

  • How is the criticality of a vulnerability determined?

    For CVEs and those with known exploits, the criticality of vulnerabilities is obtained based on CVSS information available. For other risks that are not pure CVEs, criticality is assessed based on factors such Network Vulnerability Tests (NVTs) that come from opensource feeds such as OpenVAS/Greenbone Community Feed.

  • How is the overall customer risk score calculated?

    The quantified risk score presented in the Managed Risk is calculated based on multiple factors. Get full details in the Quantifying Cyber Risk: Calculating the Arctic Wolf Risk Score Managed Risk Technology Showcase.

Harden

Find out exactly where you're exposed and start prioritizing security posture improvements. Read more.

  • How does The LAN Network proactively mitigate digital risks?

    Built on the The LAN Network Platform and delivered by security operations experts, The LAN Network Managed Risk is designed to help you discover, benchmark, and harden your environment against a greater number of digital risks beyond vulnerabilities. The solution produces easy-to-understand risk scores delivered through insightful dashboards and reports provided by your Concierge Security Team (CST). Your CST works directly with you to add context to identified risks, deliver insight on configuration gaps and account takeover (ATO) exposure, and provide strategic guidance so you gain clarity on what you should do next to proactively mitigate risk.

    • 24/7 monitoring
    • Alert triage and prioritization
    • Custom protection rules
    • Guided remediation
    • Detailed reporting and audit support
    • Ongoing strategic security reviews
  • How does my Concierge Security team help if an issue is found?

    The Concierge Security Team (CST) is your single point of contact for your The LAN Network Managed Risk solution to help you through remediation if a critical risk is found. Your CST serves as your trusted security operations expert and as an extension of your internal team. They help you:

    • Customize service to your needs
    • Continuously scan your environment for digital risks
    • Perform monthly risk posture reviews
    • Provide actionable remediation guidance
    • Deliver a customized risk management plan to prioritize remediation and measure progress

Managed Risk Addresses the Most Critical Cyber Security Challenges

Undetected Risks

Most vulnerability scanners miss digital risks that are anything other than software defects, like system misconfigurations and corporate credential exposure.


Too Many Alerts

The sheer volume of vulnerabilities, both detected and exploited, is increasing sharply. IT and security teams are becoming overwhelmed with too many alerts and not enough context.


Limited Asset Visibility

If you can’t see it, you can’t protect it. Yet, most organizations are unable to accurately chronicle assets in their environment. This leads to gaps in posture that leave the door open to attackers.

"By 2022, organizations that adopt risk-based vulnerability management processes will suffer 80% fewer breaches."

- Gartner

Detection and Response by the Numbers

The growing attack surface compounds cyber risks for organizations. The implementation of new digital initiatives, the adoption of the Internet of Things (IoT), and the continued move to the cloud help drive innovation — but at the cost of increased exposure to threats. ​Risk management solutions are becoming the norm to combat this issue.

40%


Mid-size enterprises with a formal vulnerability management program in place

60%


Number of IT risk management roles predicted to become dependent on risk management solutions to aggregate digital risks in their business ecosystems by 2025

80%


Implementing the Center for Internet Security’s (CIS) top five critical security controls can prevent 80% of the most common cyber attacks

Sources:

  • Gartner
  • Gartner
  • CIS

The LAN Network Managed Risk

Discover


24/7 Risk Monitoring

Around-the-clock monitoring for vulnerabilities, system misconfigurations, and account takeover exposure across your endpoints, networks, and cloud environments.


Risk Prioritization

Security observations are enriched with digital risk information to add greater context, quantify your exposure, and prioritize actions.


Dynamic Asset Discovery

We automatically and continuously map, profile, and classify assets on your network to help you understand your attack surface.

Benchmark


Configuration Benchmarking

Reveal configuration errors and drift over time that are invisible to most vulnerability assessment and management tools.


Risk Scoring

Presents a quantified view of digital risks that exist in your environment weighted based on severity, and benchmarked against industry peers to track the progress of your remediation efforts.


Actionable Reporting

Automated and exportable risk score trends, action lists, executive summary, and risk assessment reports summarize risk exposure in consumable, shareable formats to help you prioritize actions that harden your environment.

Harden


Guided Remediation

Your named security operations expert provides you with personalized risk remediation and validation that the vulnerability has been successfully remediated, while also verifying it hasn’t returned.


On-Demand Reporting

Your CST can create ad-hoc reports with rich charts and dashboards for meeting compliance needs or providing on-demand executive reporting to elevate visibility and close gaps.


Strategic Recommendations

Your named security operations expert becomes your trusted security advisor, working with you to make recommendations that harden your security posture over time.

Delivered by Your Dedicated Concierge Security® Team

Concierge Deployment


Minimize confusion, complexity, and time with a white-glove deployment engagement.

24/7 Continuous Monitoring


Around-the-clock digital risk coverage of your endpoints, networks, and cloud environments by a dedicated team.

Named Security Expert


Trusted security advisors with years of expertise operate as or an extension of your existing IT team.

Strategic Guidance


Identifies progress on remediation of identified risks and provides strategic guidance to harden your security posture over time.

Predictable Pricing

The LAN Network Managed Risk pricing is based on stable parameters including users and servers, allowing businesses to fully secure environments while controlling costs.

See It in Action

The LAN Network Managed Risk Dashboard is a cloud-based portal that provides visibility into the real-time risk landscape on your networks, endpoints, and cloud environments. We tailor the dashboard to your organization’s priorities to help you make sense of vulnerabilities, while also managing and prioritizing patching to reduce cyber risk exposure.


A single interface for all things cyber risk:

  • Visibility into your cybers security posture, including prioritized threats and your overall cyber risk score
  • Insight into your organization’s risk trends and industry comparisons
  • Operational optimization by giving insight into prioritizing your information security and technology activities

What Our Customers Say

"Cyber security threats continually transform and mature. The LAN Network, however, delivers the tools and expertise to continually monitor our environment and alert on these threats. I rest easier knowing our operations are monitored 24/7 with The LAN Network."


- AJ Tasker

Vice President and Director of IT, First United Bank & Trust

Read the Case Study

Learn More About Vulnerability Management

Arctic Wolf Managed Risk Data Sheet


Start developing a real-time understanding of your cyber risks and take prioritized action with the Arctic Wolf® Managed Risk solution.

Read the Datasheet

Cyber Risk Spotlight Report


In the Cyber Risk Spotlight Report, we outline 11 important metrics to watch to understand your organization's holistic risk profile.

Read the Report

Buyer's Guide: Managed Vulnerability Assessment


Learn the key advantages managed vulnerability assessment offers organizations of every size, as well as the right questions to ask when evaluating vendors for risk-based vulnerability management.

Read the Guide

Ready to Get Started?

We’re here to help. Reach out to schedule an introductory call with one of our team members and learn more about how The LAN Network can benefit your organization.


General Questions:

(800) 641-1927

support@thelannetwork.com

Contact Us

Share by: