We all feel a great sense of relief because now we can focus on our core competency instead of platform issues. Henson Group has given our company a solid solution that can grow with the needs of our fast-growing client base.
Jim Dodson
CEO Spendbridge
(99+) Jim Dodson | LinkedIn
In Henson Group, we found a real partner with deep cloud experience. After Several successful projects, they are now our go-to trusted advisor.
Lucky Pandit
COO of Safal Partners
(99+) Lucky Pandit | LinkedIn
What Our Clients Say
We all feel a great sense of relief because now we can focus on our core competency instead of platform issues. Henson Group has given our company a solid solution that can grow with the needs of our fast-growing client base.
Jim Dodson
CEO Spendbridge
(99+) Jim Dodson | LinkedIn
Secure your Microsoft Cloud Services with Henson Group & Armor
Watch our Security Webinar
01
Think Eleven Ltd out of the UK provides powerful and intuitive competency management software, in addition to valuable industry expertise on all aspects of competency and talent management. The company technical lead David Clough goes into detail about how Henson Group made the company's journey to the cloud "as painless as it could possibly be" and how they got the best support possible along the way.
02
Mjengo Limited was established in 1991 as a trading and hardware business and eventually transformed into one of East Africa's leading FMCG Companies. The company's ICT admin Sidik Rashid goes into detail about how his company relies on Henson Group for our reliability, expertise with Microsoft products, great pricing, and quick turnaround time in our technical support ticketing system. To learn more about Mjengo please visit their website at https://malbros.co.ke
03
Sam Cozens of Merchant Taylors explains how he contacted Microsoft to move the cloud, and Henson Group was recommended by Microsoft as the perfect partner for his needs. Sam also explains how Henson Group has fit all of his needs and exceeded his expectations in the companies cloud journey.
04
Harold Bush of Aquasystems talks about Henson Group's ability to respond at a global level to his companies needs, quickly and efficiently. Aquasystems needed a Gold Microsoft Partner with in-depth Azure experience, and sales team member Kelsey Saunders was able to deliver the service Harold and his team needed. Please take a moment to watch the video and learn more about Aquasystems journey to the cloud.
05
Erin Francis, founder of ZOE Blueprint talks about their journey to the cloud, and how Henson Group was able to offer them the solutions they needed. Erin also goes into detail in the relationship that was built between Henson Group and their extensive knowledge and expertise in the field, as well as how easy it was to work with their team members.
06
Top Myers, President of ASURiO, Inc talks about how Henson Group met the needs of their cloud journey to Microsoft Azure.
07
Pastor Daniel J. Herrera is the IT Director at The Cathedral of Faith, which is a 501(c)3 non-profit organization and uses Henson Group for their cloud needs. He explains how Henson Group met their needs, and helped them migrate to the cloud effectively, with top notch customer support.
08
Adam Crumrine, the Director of Analytics at The Ohio Insurance Agents Association describes how Henson Group meet the pricing demands and high quality service they needed.
09
Larry Miller the CEO at Smart Retail Solutions speaks on how Henson Group helped migrate his company to the cloud, and the solutions they helped his company achieve with Azure.
Real Use Cases for Intelligent MDR Security
Real-Time Phishing Attack Mitigation
DDoS Attack and Business Continuity
Insider Threat Detection and Mitigation
Challenge
A financial institution experiences a sophisticated phishing attack aimed at its employees. The attack involves emails that mimic the institution's internal communications, tricking employees into revealing their login credentials on a fake login page.
Response
The Intelligent MDR Security service's advanced email filtering and anomaly detection capabilities quickly identify the phishing emails based on unusual patterns and indicators of compromise. The service automatically quarantines the emails, preventing them from reaching employees' inboxes. Simultaneously, the incident response team is alerted and begins an immediate investigation. They also initiate a password reset for potentially compromised accounts and deploy targeted security awareness training to educate employees about the specifics of the attack, enhancing their ability to recognize future phishing attempts.
Outcome
The quick detection and response limit the attack's impact, with no significant data breach occurring. The incident highlights the value of the Intelligent MDR Security service in providing proactive protection and the importance of continuous employee training in cybersecurity awareness.
Challenge
A regional bank becomes the target of a distributed denial-of-service (DDoS) attack, threatening to disrupt its online banking services and degrade customer trust and satisfaction.
Response
The Intelligent MDR Security service detects the abnormal surge in traffic and immediately implements pre-configured DDoS mitigation strategies to filter out malicious traffic while allowing legitimate requests to pass through. The incident response team works closely with the bank's IT department to reroute traffic and deploy additional resources to handle the increased load. Throughout the attack, communication with stakeholders is maintained, ensuring transparency and managing expectations.
Outcome
The bank's online services remain available to customers with minimal disruption, demonstrating the resilience of its operations and the effectiveness of the Intelligent MDR Security service in ensuring business continuity in the face of cyber threats.
Challenge
An employee at a financial services firm begins accessing and downloading sensitive customer data at an unusual volume and rate, indicating a potential insider threat or a compromised account.
Response
The Intelligent MDR Security service's user and entity behavior analytics (UEBA) capabilities detect the anomalous behavior and alert the security team, who quickly isolate the employee's account and initiate a forensic investigation. The investigation reveals that the employee's credentials were compromised due to a malware infection on their workstation.
Outcome
Swift action prevents the exfiltration of sensitive data and addresses the malware infection, mitigating the threat. This scenario underscores the importance of robust behavioral analytics and the ability of Intelligent MDR Security services to detect and respond to insider threats and compromised accounts effectively.
Healthcare Industry Use Cases
Healthcare Targeted Phishing Campaign
Ransomware Attack on Hospital Systems
Insider Threat Leading to Data Breach
Detection
Your MDR service detects unusual login attempts and alerts the healthcare organization’s security team.
Response
The MDR team conducts a rapid investigation, identifies the compromised accounts, and isolates them to prevent further unauthorized access.
Remediation
The affected systems are cleaned, and the compromised passwords are reset. The MDR team provides guidance on strengthening security practices to prevent future incidents.
Background: A healthcare organization is targeted by a phishing campaign designed to steal employee credentials. The attacker uses these credentials to gain access to the organization’s network and attempts to exfiltrate sensitive patient data.
Compliance and Reporting
The incident is documented, and all necessary compliance reports are prepared to ensure the healthcare organization meets its regulatory obligations.
Detection
The MDR service identifies the ransomware encryption activity early in the attack lifecycle by monitoring unusual file system activity and alerts the hospital's IT security team.
Response
The MDR team immediately isolates the affected systems to prevent the spread of ransomware to other parts of the network. They work closely with the hospital’s IT staff to identify the attack vector.
Remediation
Leveraging backups and decryption tools, the MDR team begins the process of restoring encrypted data. They also patch the exploited vulnerability and conduct a thorough security sweep to ensure no remnants of the ransomware remain.
Background: A large hospital network becomes the target of a sophisticated ransomware attack. The attackers exploit a vulnerability in an outdated medical records system to deploy ransomware, encrypting critical patient data and demanding a ransom for the decryption key.
Compliance and Reporting
The incident is thoroughly documented, including steps taken to respond and recover from the attack. The MDR service assists the hospital in notifying regulatory bodies as required and advises on communication with patients about the breach.
Detection
The MDR service detects unusual data access patterns and large volumes of data being copied to an external location. This triggers an immediate investigation.
Response
The compromised user account is quickly identified and disabled. The MDR team works to trace the path of the data exfiltration to understand the scope of the breach.
Remediation
Steps are taken to secure the data and prevent further unauthorized access, including changing access protocols, increasing security awareness training for employees, and implementing stricter access controls.
Background: An employee at a healthcare insurance company unintentionally becomes an insider threat by falling victim to a social engineering scam, resulting in unauthorized access to thousands of patients' insurance records.
Compliance and Reporting
The MDR team assists in the legal and regulatory reporting requirements, helping to draft notifications to affected patients and advising on mitigating potential harm. They also provide a detailed report on the incident’s cause and recommendations for preventing similar incidents.
Stay in Touch
Sign up for our newsletter to receive our latest news and announcements!
Hear directly from our customers
Benefits of Henson Group & Armor
Detect Malicious Behavior: Collect logs and telemetry across your enterprise and cloud environments and leverage Armor's robust threat-hunting and alerting library to detect threats.
Prioritize Applicable Threats: Using open source, commercial, and proprietary threat intelligence, the Armor platform enriches incoming data to enable smarter, faster determinations of threat levels.
Respond to Threats: When threats are detected, alerts and incidents are created – you can rely on Armor's team of security experts around-the-clock to respond to threats.
Identify and Remediate Weaknesses: Armor can perform advanced forensic investigations during and after an incident to help identify the path an attacker took and how to remediate the weaknesses the attacker exploited.
Save Time with Automation: Armor's platform was built to take advantage of advanced AI and machine learning, as well as cloud-native automation engines to make all aspects of the security lifecycle simpler.
Enhanced Service Offerings: Customers will have access to one of the most comprehensive sets of tools and services available in the cloud sector today.
Global Reach with Local Expertise: The combined capabilities of both companies will ensure global reach while maintaining a high level of local expertise and support.
Innovative Cybersecurity Measures: With cybersecurity at the heart of digital transformations, clients will benefit from pioneering security measures integrated seamlessly with all cloud services.
Henson Group and myCloudDoor announce Strategic Alliance
to Enhance Cloud Solutions and Cybersecurity Services