“ĢTV notified us of the threat before we had any idea what was happening,” said Tom Noon, VP of Operations at Missouri-based MSP, Blue Tree Technology. “Their team gave us all the information we needed to get up to speed, including the machine name that was infected, the steps to confirm the infection, and how to remediate the threat.” In this case, the infected machine was hosted by IntelliData Solutions, a hosting partner of Blue Tree Technology.
“We had VMware servers that were patched, yet hackers were still able to sneak through,” said Pavan Agrawal, CTO at IntelliData Solutions. “ĢTV gave us a specific set of instructions that told us how to confirm that there was an infection and how to remediate the threat. We were able to easily follow the instructions to evict the malicious content and confirmed with ĢTV once it was complete. We avoided a really messy situation—that’s all thanks to ĢTV.”
After following ĢTV’ remediation steps, both IntelliData Solutions and Blue Tree Technology successfully restored their data to its pre-infected state by the end of the day. “ĢTV helped us be more proactive, rather than reactive,” said Alec Smith, President at IntelliData Solutions. “If we hadn’t confirmed and remediated the threat, client information would have been compromised and we could have suffered severe damage to our reputation.”
ĢTV Managed EDR captures threat actor activity by actively monitoring processes in near-real-time. The forensics performed by Managed EDR identifies and alerts administrators to suspicious activity. However, unlike traditional cybersecurity technology which relies on administrators to comb through all the data and alerts, Managed EDR is backed by ĢTV’ team of human threat hunters. The ĢTV SOC team filters through the alerts for partners to verify threats and send only incident reports that require attention paired with remediation instructions. This eliminates false positives and assures partners that alerts are timely and relevant.
“Artificial intelligence is good, but there is nothing better than the human intelligence of ĢTV’ threat hunters,” explains Tom of Blue Tree Technology. “We get so many alerts, noise and false positives from our other cybersecurity tools—it’s hard for our technicians to know what to focus on. ĢTV filters out all that noise. Their SOC team does a remarkable job of verifying threats and only sending alerts when they need our attention or action. Our techs know that when an alert from ĢTV comes through, they better look at it. This incident was an example of that—and it gave us the validation we needed to roll out ĢTV to all our clients.”