Cybersecurity Fusion Center (CSFC) Offerings | HCLTech

CSFC Offerings

Cyber security incident monitoring & response
  • Always-on security Monitoring

    Always-on security Monitoring

  • Threat Intelligence

    Threat Intelligence

  • Security Analytics

    Security Analytics

  • Security Automation & Orchestration

    Security Automation & Orchestration

  • Incident Response

    Incident Response

Security assurance management services
  • Penetration Testing

    Penetration Testing

  • Unified Vulnerability Management

    Unified Vulnerability Management

  • Firewall Rule Assurance

    Firewall Rule Assurance

  • Application Security On-Demand

    Application Security On-Demand

  • Cyber Awareness Training

    Cyber Awareness Training

  • Business Email Protection

    Business Email Protection

Managed protection service
  • Security Device Management

    Security Device Management

  • Digital Endpoint Security Management

    Digital Endpoint Security Management

Identity & access management
  • User Life Cycle Management

    User Life Cycle Management

  • Privileged Access Management

    Privileged Access Management

CSFC Offerings

Cyber Threat Detection & Response
  • Fusion Detect & Response

    Fusion Detect & Response

  • Digital Threat Intelligence

    Digital Threat Intelligence

  • Security Analytics

    Security Analytics

  • Incident Response Services

    Incident Response Services

  • Immediate Threat Management

    Immediate Threat Management

Secure Foundation Services
  • Security Controls/Platform  Administration

    Security Controls/Platform Administration

  • Hybrid Cloud SecOps & Governance

    Hybrid Cloud SecOps & Governance

  • OT/ICS/IOT SecOps & Governance

    OT/ICS/IOT SecOps & Governance

Attack Surface Management Services
  • Offensive Security ( Red Team, PT , MAPS )

    Offensive Security ( Red Team, PT , MAPS )

  • VERITY-VM (Infra, Apps, OT)

    VERITY-VM (Infra, Apps, OT)

  • Control Configurations Assurance

    Control Configurations Assurance

  • Cyber Awareness Training/Phishing

    Cyber Awareness Training/Phishing

  • Security Benchmarking

    Security Benchmarking

  • Cyber Resiliency as-a-service

    Cyber Resiliency as-a-service

Identity Access Management (IAM)
  • Managed Identity -as a-service

    Managed Identity -as a-service

  • Privileged Access Management (PAM)

    Privileged Access Management (PAM)

Governance, Risk, and Compliance (GRC)
  • R&C Management as a Service

    R&C Management as a Service

  • 3rd Party Risk Management

    3rd Party Risk Management

  • Data Subject Rights Management

    Data Subject Rights Management