top of page

Frequently Asked Questions

Since 1990, JED has provided security services quickly prevent, detect and respond to threats. Our adaptable level of service, complete transparency of actions and ability to detect  a threat but provide a full analysis and assessment has been building for 25 years.

 01  What our clients and employers think

While at Fidelity Investments, JED was a trusted advisor who helpe them develop deep bench of resources. JED personally, learned about the Fidelity Information Systems Development lifecyle, he helped them developed a flexible and straightforward approach to incident response and personal computer deployment. He published articles for their internal employee newsletter to help raise employee awareness of cyber security concurrently with the deployment of new technologies to help eliminate the gap between technology and controls that has plagued other companies.

 

 

 

 02  What is Cyber threat Intelligence.

Techniques that gather , classify, and exploit knowledge about adversaries, is collectively known has cyber threat intelligence. It enables network defenders to establish a state of information superiority that decreases the adversary liklihood of success with each subsequent intrusion attempt Responders need accurate, timely and detailed information to monitor new and evolving attacks, as well as methods to exploite this information to put in place an improved defensive posture.  We need to help shift strategic resources by learning to

1) Determine when the analysis of an intrusion by sophisticated actor is complete.

2) Identify,extract, prioritize and leverage intelligence from APT intrusions

3) Leverage collected intelligence to improve success in defending against and responding to future intrusions.

 

Threat intelligence supports all aspects of our service portfolio. JED can uses cyber threat intelligence to provide predictiv, continuous and responsive protection for your organization.

 

With global threat visibility intelligence, during a targeted attack, when your organization needs the best incident response and hunters in the field, JED will be able help you rise to the occassion.

 

 

 

 03  What Managed Security Services do you provide?

​You need the right instrumentation, information and experience to combat today's cyber security threats. While it may sound simple, it requires leadership. Security staff  must sift through mountains of data to identify and response to actual threats. Most organizations  don't have the time, money, or personnel to maintain a finely-tuned security program 24X7X365.

 

JED has a unique approach developed for your organization that is based 25 years of watching and researching the market place to gain unmatched visibility into the global threat landscape by partnering with IBM the leader in the managed security. This includes End Point Threat Detection, Enterprise Sensors, Firewall Configuration Management, Log Monitoring & Retention,  as well as Managed: Advanced Malware Protection, IPS/IDS, Server Protection, SIEM. JED also provides Next Generation Firewall, PCI Scanning, Policy Compliance, Security Monitoring , and Vulnerability Management.

 

 

 04  Why JED Consulting Services?

JED Consulting Services, LLC, listens to clients and delivers innovative technology and services that give them the power to do more. Recognized as an industry leader by the Board of Directors of the Institute of Internal Auditors (Certified Internal Auditor), Information Systems Audit and Control Association (ISACA)/CISA, and International Information Systems Systems Security Certification Consortium (CISSP), and the Connecticut State Board of Accountany (CPA). JED security services provides world-class information security services to help organizations of all sizes protect their assets, comply with regulations, and reduce security costs.

 

Here are some of the highlights of our tope IT Security Services

 

1) Advanced Malware Protection and Detection

2) Advanced Endpoint Threat Detection

3) PCi Compliance

4) Penetration Testing

5) Incident Response

 

 05  I'm a Question. Click to edit me.

I'm a paragraph. Click here to add your own text and edit me. It’s easy. Just click “Edit Text” or double click me to add your own content and make changes to the font. Feel free to drag and drop me anywhere you like on your page. I’m a great place for you to tell a story and let your users know a little more about you.

bottom of page