Powered by Arctic Wolf
"Securing Your Business and Customer's Information"
TLN is a Registered and Authorized Business Partner with Lenovo, certified for PC and server repair and deployment. Our services are backed by Lenovo and all parts are OEM, handled by experienced computer network engineers.
Lenovo is a global leader in IT, esports and VR products. Since 2010, our roots have been in technology and competitive esports. The cross-section of esports and education is a focus we continue to develop and expand our offerings with an incredible partner like Lenovo.
TLN offers complimentary initial consultations to those considering system deployment or data migration. You’ll explain your technology strategy and what your current system lacks (if applicable) to our experienced Lenovo technicians, who will strategize how our services can help.
ANALYSIS
Our certified computer network engineers evaluate your current network infrastructure and hardware to determine what will be needed to achieve results. From there, the quantities and requirement details of your solution will be taken to our authorized design engineers for preparation.
DESIGN
System designers at TLN are trained to obtain appropriate, compatible equipment and licenses. You will receive a quote within 24-48 hours and an estimated timeframe for arrival and completion. We are partners and certified with Lenovo, so you can be confident that your IT solution will meet expectations and supported by both TLN and Lenovo.
IMPLEMENTT
System deployment is a two-step implementation:
1. Off-site configuration. Our system engineers assemble and program your Lenovo hardware to specification.
2. On-site deployment. Computer network engineers convert and setup your new Lenovo system, along with experienced cabling technicians if necessary. We can safely remove and properly recycle unneeded hardware, securely erasing any of your existing data.
SUPPORT
TLN is committed to your success and happy to offer comprehensive support services after deployment. From user training to future changes and alterations, there may be little bits and pieces that you realize afterwards that need adjusting or explaining – and we will gladly assist you.
Free Consultations
24/7 Monitoring
Turnkey Concierge
Hours:
The LAN Network Managed Risk enables you to discover, benchmark, and harden your environment against digital risks across your networks, endpoints, and cloud environments.
Built on the industry’s only cloud native platform to deliver security operations as a concierge service — The LAN Network Managed Risk enables you to continuously scan your networks, endpoints, and cloud environments to quantify digital risks. Your security operations expert from the Concierge Security® Team works directly with you to discover risks beyond simple vulnerabilities, benchmark the current state of your environment, and implement risk management processes that harden your security posture over time.
The LAN Network Managed Risk continuously scans your networks, endpoints, and cloud environments for risky software, assets, misconfigurations, and accounts beyond simple vulnerability assessment tools. Delivered as a concierge service, Managed Risk helps you take a more proactive approach to security by identifying gaps to harden your security posture over time. Managed Detection and Response helps you detect, respond, and recover from active threats to neutralize their impact, while providing strategic guidance along your security journey.
There are three main differences in the external scans performed by the two solutions. The first is self-service access to the scanning configuration and results are available in the Managed Risk dashboard. The second is with Managed Risk — the scan frequency can be set to execute weekly, whereas the default scan is monthly with MDR. Finally, Managed Risk uniquely performs web application scans, which provides deeper granularity of exposure on any external facing applications such as portals or dashboards.
Currently, installing the Agent is not a requirement — but it is recommended. Audit and alert data collected from supported devices assists in detecting potential threats, as well as uncovering known vulnerabilities and risks. The Agent is required to be installed to address additional use cases, such as Host-Based Vulnerability Assessment and CIS benchmarking (Managed Risk), and Managed Containment (Managed Detection and Response) — where a host device is required to be contained.
The The LAN Network Agent can be deployed using a deployment tool such as General Policy Object (GPO) for Windows environments, or Jamf for MacOS environments. Since the installer generates a unique ID upon startup, it is not recommended or supported to install the agent on a “golden image” in Virtual Desktop Infrastructure (VDI) environments.
Existing The LAN Network Customers should submit a ticket to their Concierge Security Team (CST), who works directly with them to deploy the The LAN Network Agent in their environment. Existing customers can also contact their Customer Success Manager, which will trigger the same workflow of submitting a ticket to install the The LAN Network Agent with the CST.
Quickly identify and categorize risky software, assets, and accounts. Read more.
Yes. The web application scanning capability will look for risks such as cross-site scripting, SQL injection, and other OWASP Top 10 types of attacks.
Audit trail information of changes made is recorded and can be requested from your security operations expert from the CST. Currently, this information is not visible in the Managed Risk Dashboard.
The Account Takeover capability is updated with new information obtained from dark and grey web sources weekly. These scans are completed on a monthly cadence to capture any corporate credentials or other critical personally identifiable information (PII) that may have been exposed as part of a publicly disclosed data breach.
The Network Vulnerability Tests (NVTs) arrive from the OpenVAS/Greenbone Community Feed. This feed is updated as needed but is generally updated daily. The LAN Network polls for new NVTs on an hourly basis.
Yes, when combined with The LAN Network Cloud Monitoring, Managed Risk features a Cloud Security Posture Management (CSPM) capability that can scan for vulnerabilities and misconfigurations in SaaS and IaaS environments such as AWS.
Yes, data from The LAN Network Agent is searchable in Log Search. AWN-Agent is the type.
Understand your current digital risk posture and identify gaps relative to best practices. Read more.
For CVEs and those with known exploits, the criticality of vulnerabilities is obtained based on CVSS information available. For other risks that are not pure CVEs, criticality is assessed based on factors such Network Vulnerability Tests (NVTs) that come from opensource feeds such as OpenVAS/Greenbone Community Feed.
The quantified risk score presented in the Managed Risk is calculated based on multiple factors. Get full details in the Quantifying Cyber Risk: Calculating the Arctic Wolf Risk Score Managed Risk Technology Showcase.
Find out exactly where you're exposed and start prioritizing security posture improvements. Read more.
Built on the The LAN Network Platform and delivered by security operations experts, The LAN Network Managed Risk is designed to help you discover, benchmark, and harden your environment against a greater number of digital risks beyond vulnerabilities. The solution produces easy-to-understand risk scores delivered through insightful dashboards and reports provided by your Concierge Security Team (CST). Your CST works directly with you to add context to identified risks, deliver insight on configuration gaps and account takeover (ATO) exposure, and provide strategic guidance so you gain clarity on what you should do next to proactively mitigate risk.
The Concierge Security Team (CST) is your single point of contact for your The LAN Network Managed Risk solution to help you through remediation if a critical risk is found. Your CST serves as your trusted security operations expert and as an extension of your internal team. They help you:
Undetected Risks
Most vulnerability scanners miss digital risks that are anything other than software defects, like system misconfigurations and corporate credential exposure.
Too Many Alerts
The sheer volume of vulnerabilities, both detected and exploited, is increasing sharply. IT and security teams are becoming overwhelmed with too many alerts and not enough context.
Limited Asset Visibility
If you can’t see it, you can’t protect it. Yet, most organizations are unable to accurately chronicle assets in their environment. This leads to gaps in posture that leave the door open to attackers.
"By 2022, organizations that adopt risk-based vulnerability management processes will suffer 80% fewer breaches."
- Gartner
The growing attack surface compounds cyber risks for organizations. The implementation of new digital initiatives, the adoption of the Internet of Things (IoT), and the continued move to the cloud help drive innovation — but at the cost of increased exposure to threats. ​Risk management solutions are becoming the norm to combat this issue.
Mid-size enterprises with a formal vulnerability management program in place
Number of IT risk management roles predicted to become dependent on risk management solutions to aggregate digital risks in their business ecosystems by 2025
Implementing the Center for Internet Security’s (CIS) top five critical security controls can prevent 80% of the most common cyber attacks
Sources:
24/7 Risk Monitoring
Around-the-clock monitoring for vulnerabilities, system misconfigurations, and account takeover exposure across your endpoints, networks, and cloud environments.
Risk Prioritization
Security observations are enriched with digital risk information to add greater context, quantify your exposure, and prioritize actions.
Dynamic Asset Discovery
We automatically and continuously map, profile, and classify assets on your network to help you understand your attack surface.
Configuration Benchmarking
Reveal configuration errors and drift over time that are invisible to most vulnerability assessment and management tools.
Risk Scoring
Presents a quantified view of digital risks that exist in your environment weighted based on severity, and benchmarked against industry peers to track the progress of your remediation efforts.
Actionable Reporting
Automated and exportable risk score trends, action lists, executive summary, and risk assessment reports summarize risk exposure in consumable, shareable formats to help you prioritize actions that harden your environment.
Guided Remediation
Your named security operations expert provides you with personalized risk remediation and validation that the vulnerability has been successfully remediated, while also verifying it hasn’t returned.
On-Demand Reporting
Your CST can create ad-hoc reports with rich charts and dashboards for meeting compliance needs or providing on-demand executive reporting to elevate visibility and close gaps.
Strategic Recommendations
Your named security operations expert becomes your trusted security advisor, working with you to make recommendations that harden your security posture over time.
Minimize confusion, complexity, and time with a white-glove deployment engagement.
Around-the-clock digital risk coverage of your endpoints, networks, and cloud environments by a dedicated team.
Trusted security advisors with years of expertise operate as or an extension of your existing IT team.
Identifies progress on remediation of identified risks and provides strategic guidance to harden your security posture over time.
The LAN Network Managed Risk pricing is based on stable parameters including users and servers, allowing businesses to fully secure environments while controlling costs.
The LAN Network Managed Risk Dashboard is a cloud-based portal that provides visibility into the real-time risk landscape on your networks, endpoints, and cloud environments. We tailor the dashboard to your organization’s priorities to help you make sense of vulnerabilities, while also managing and prioritizing patching to reduce cyber risk exposure.
A single interface for all things cyber risk:
"Cyber security threats continually transform and mature. The LAN Network, however, delivers the tools and expertise to continually monitor our environment and alert on these threats. I rest easier knowing our operations are monitored 24/7 with The LAN Network."
- AJ Tasker
Vice President and Director of IT, First United Bank & Trust
Start developing a real-time understanding of your cyber risks and take prioritized action with the Arctic Wolf® Managed Risk solution.
In the Cyber Risk Spotlight Report, we outline 11 important metrics to watch to understand your organization's holistic risk profile.
Learn the key advantages managed vulnerability assessment offers organizations of every size, as well as the right questions to ask when evaluating vendors for risk-based vulnerability management.
We’re here to help. Reach out to schedule an introductory call with one of our team members and learn more about how The LAN Network can benefit your organization.
General Questions:
(800) 641-1927
Thank you for contacting us. We’ll get back to you as soon as possible.
Oops, there was an error sending your message.
Please try again later.
Share On: