Field Effect Cybersecurity Solutions

Sector, Company Type, and Location:Managed Service Provider  |  Europe  |  Australia  |  Canada  |  UK  |  North America
Tags & Search Filters:MDR

Field Effect is a global cybersecurity company, founded in 2016 and headquartered in Ottawa, Canada. The company is a leader in the development of network application solutions, low level systems development and cybersecurity analytics. Field Effect's Managed Detection and Response (MDR) solution, flexible simulation-based training platform and expert-led professional services form a unified defence for businesses of any size, with a particular focus on small to medium sized businesses. Field Effect has received recognition from Deloitte in the Technology Fast 500 2021: North America, as well as awards from Fortress Cybersecurity Awards 2021, Cyber Security Excellence Awards 2021 and Global Infosec Awards: Cyber Defence Magazine 2021.

Summary

Field Effect Cybersecurity Solutions: Comparisons, Review, Benefits, Use Cases, Pros & Cons

Author: Netify Research Team

If you have questions about Field Effect and how their capability is aligned to your needs, email the Netify research team.
UK: uk@netify.co.uk North America: northamerica@netify.com

(Please use the UK email for ROW - Rest of the World - questions or enquiries)

Resources and Downloadable Content
Request the very latest Field Effect data sheet PDF directly from your local account team. Please check your junk folder if not received.
Book a demo of the Field Effect cybersecurity services capability over Zoom or Teams. Learn about their management portal, deployment, SLA and support. You will receive an email asking for times/dates, please check your junk folder if not received.
Request your local in-country sales contact. You will receive details as soon as possible - please check your junk folder if not received.
Marketplace Assistance

Are you an IT decision maker building your own SD WAN or SASE Cybersecurity shortlist?

Take our 90 second assessment quiz to find out which top 3 vendors or managed providers are a match for your answers.

Cybersecurity and SD WAN

Field Effect Products and Services:

Field Effect's solution focuses on managed security, including detection & response as well as cyber risk management services. Please see below for products/services offered:

Products:

Covalence:

  • Endpoints
  • Network
  • Cloud

Endpoint threat sensor and monitoring:

  • Support for Windows, Linux, macOS, iOS/iPadOS and Android.
  • Identifies lateral movement within a network, with continuous analysis to identify software vulnerable to remote code execution.
  • Windows Event Log Telemetry identifies login events and installation of malicious software, offering network-wide detection and analysis of PowerShell script execution and other scripting engines.
  • Active Response capabilities are built-in.
  • Optional integration with third-party endpoint agents for consolidated alerting.

APIs and SDKs:

  • Simple RESTful API integration for alerts and threat management.
  • Integrates within existing tools and business workflows.
  • Integrations and add-ons for third-party products.

Cloud threat detection:

  • Coverage for a growing list of cloud platforms, including Microsoft 365, Google G Suite, Microsoft Azure, Amazon AWS, Dropbox, Box.com, and more.
  • Monitors and identifies active threats to cloud systems.
  • Business Email Compromise (BEC) prevention.
  • Implementation of User and Entity Behavior Analytics (UEBA).
  • Automatically locks and protects accounts, with alerting on important security-related configuration changes.

Full capture network sensor and monitoring:

  • Threat intelligence-backed Indicators of Compromise (IOC) blacklists.
  • Advanced content inspection and threat detection.
  • Advanced anomaly and node behaviour deviation detection.
  • Machine learning analytics identifies new and unknown anomalies.
  • IoT device monitoring.
  • Captures and rewinds network traffic in the event of a suspicious or confirmed incident.
  • Protocol discovery and inspection.
  • Identifies weak, misconfigured or out of date protocols and communications.
  • Support for regulatory and industry standards compliance (e.g., NIST CSF, Canadian Centre for Cyber Security Baseline Controls, ISO 27001, and more).
  • Full capture (bit-level) analysis.
  • Support for network summarisation technologies (e.g., IPFix, NetFlow, sFlow, pFlow).
  • Better than SIEM functionality and pricing.

Cyber Range:

  • Cybersecurity training that can be deployed on enterprise hardware or in private clouds

Identical and isolated environments:

  • Leveraging integrations with enterprise VMWare virtualisation technology, the product is designed to insure that every student’s environment is unique and identical to their peers.
  • Automated, per-student network setup.
  • Shared instructions for all students.
  • Quickly reset individual students after an unrecoverable action.

Dynamic environments:

  • Add unpredictability to your exercises using pre-canned actions that can be triggered by time or in response to a student actions.
  • Choose from our library of pre-canned actions or add your own.

Modular deployment on premises or in the cloud:

  • Built for organisations of any size, with one or multiple locations.
  • Scalable from five to 200 concurrent users.
  • Can be deployed in the cloud or in a classified or air-gapped network, with no Internet required.
  • Courses, exercises and actions can be accessed, online or offline, as self-contained packages.
  • Browser-based training, no specific hardware or software required.
  • SDK published in Python using the REST API for plugin development, automation and integration with other systems.

Shared and external resources provisioning:

  • Clients can choose virtual machines from a common base library.
  • Add files and install applications using drag and drop actions.
  • Instantly apply changes, patches or updates to virtual machines during environment provisioning.
  • Mark resources as shared while maintaining isolated environments.
  • Enable external resources: Internet, ICS & SCADA systems or a bank of shared IoT devices.

Solutions:

Managed Cybersecurity:

  • Threat monitoring
  • Custom sensor configuration
  • Forensic services
  • Vulnerability identification
  • Concierge access

Secure IT Operations:

  • Continuous monitoring
  • Analysis of network and endpoint-derived data
  • Software testing
  • Attack and defence practice and rehearsal on replica networks

Virtual CISO (vCISO) Service:

  • Field Effect's virtual Chief Information Security Officer (vCISO) provides long-term or on-request access to a team of CISO's and cyber analysts. The solution is ideal for smaller companies who are not ready to take on a CISO full time and for companies requiring temporary support whilst their CISO is unavailable. 

Incident Response:

  • Field Effect's global team of security analysts will conduct a thorough investigation to ascertain the root cause of a security breach and work to remedy the issue. The solution leverages Covalence for cyber threat monitoring and protects clients against the following attack types: disruptive attacks, insider threats, Intellectual Property (IP) theft, compromised medical records, financial cyber crime, unauthorised access and stolen personally identifiable information. 

Simulation and Training Environments:

  • Leverages Cyber Range to configure visual scenarios for training, testing and development. Clients can use existing hardware for hosting training or simulations on-premise, with options for short and long term hosted options. 

Incident Response Planning:

  • Field Effect experts will work with clients to create a custom Cyber Incident Response Plan (CIRP), with a clear strategy for all internal and external stakeholders. The team will analyse a client's existing security environment, offering advice for a new strategy or changes to an existing one. 
Frequently Asked Questions
Which Partners do Field Effect Support?
What industries does Field Effect deliver solutions for?
What regulations does Field Effect comply with?
Ask a question

Send your local contact from Field Effect a message, this form will reach Field Effect directly.

Contact Field Effect
Complete the form to get in touch with a representative from Field Effect.
Report

Download the the complete guide to 10 SD WAN solutions.

The most comprehensive top 10 guide we have ever created.

Similar Companies

There are no results matching your selection.

List your business

List your business with Netify Learn More →

Please complete the form to ask a question or send a message directly to Field Effect. Netify have carefully curated global sales contacts based on your IP location. If you do not receive contact, please check your junk folder.
Book a demo of the Field Effect cybersecurity services capability over Zoom or Teams. Learn about their management portal, deployment, SLA and support. You will receive an email asking for times/dates, please check your junk folder if not received.
A Netify Vendor Briefing is a 30 minute Zoom research session for IT decision makers, and an opportunity to learn about the vendors products, services and business strategies specifically or a related technology or market. We'll also discuss their competitors and which other solutions your business should consider. If you do not receive contact, please check your junk folder.
Netify is the first dedicated global SD WAN & SASE comparison marketplace.

List Your Business