Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Ingalls MDR has been Expanded, At No Additional Cost!

Here at Ingalls, we are committed to the evolution and continual improvement of all our service offerings. Recently, our Managed Detection and Response (MDR) service was expanded to include:

MDR has been Expanded_Icon-IR-v2Significantly Increased Incident Response Discovery Hours. 

All MDR clients now receive twenty hours per incident for Incident Response Discovery, at no additional cost.  This represents a five-fold increase over the discovery hours previously provided and is appreciably more than what is provided by most MDR providers.

“In the past year, we have seen a huge shift in the active exploitation of zero-days,”

says Ingalls SOC Director and Incident Response Lead, Cyrus Robinson.  ProxyLogon, Kaseya/REvil, ProxyShell, ProxyNoShell, ManageEngine AD Self Service Plus, Log4Shell, the list is ever-growing. Ingalls recognized that our client’s threat environments are rapidly changing and we’ve expanded our MDR offering in response.  Ingalls now performs increased discovery to determine our client’s zero-day level of exposure.

In addition, anytime a client had shown serious anomalous activity or had reason to suspect a compromise, our teams spent extended hours performing compromise assessments.  Since we were already performing this level of enhanced incident response discovery we decided to make the increased Incident Response Discovery a formal MDR feature.

MDR has been Expanded_Icon-Dark-Web-v2Dark Web / Breach Monitoring.

All MDR clients now receive Dark Web/ Breach Monitoring as part of their MDR service, at no additional cost.

Dark Web monitoring involves searching for confidential information in areas of the internet not indexed by traditional search engines.  This area of the internet, known as the Dark Web, is known to be frequented by cybercriminals.

Ingalls Dark Web/ Reach Monitoring protects MDR clients by providing early detection of compromised confidential information.  To provide this level of enhanced protection, Ingalls:   

  • Monitors for compromised user credentials including email addresses, user names, and passwords
  • Analyzes data to determine if it belongs to high-risk privileged users
  • Observes data breach forums, enabling advance warning of attacks being planned or in early execution
  • Provides alerting when compromised credentials are discovered on the dark web allowing for faster response and more efficient risk mitigation
  • Funnels discovered threat data into the MDR security stack to provide comprehensive protection for all MDR clients
  • Provides the Ingalls SOC with the capability, on an as-needed basis, to investigate for references to client domains, email addresses, IP addresses, credit card numbers, etc. in sources that include:
    • Tor darknet sites/hidden services (.onion domains)
    • I2P darknet sites/eepsites (.i2p domains)
    • Paste sites (pastebin.com, hastebin.com, etc.)
    • WikiLeak Sites (WikiLeaks, Cryptome, etc.)
    • Discovered Public Data Leaks
    • Discovered Private Data Leaks
    • Public Web sources including (.ru Russian TLD, .de German TLD, .gov US government TLD, .kp North Korean TLD, .peer Decentralized blockchain TLDs)


How Ingalls Information Security Can Help

Ingalls Information Security understands cybersecurity.  Since 2010, we’ve been in war rooms and boardrooms, investigating computer networks targeted and attacked by criminals and nation-state-sponsored hackers. This experience gives us a powerful edge in preventing and responding to cyberattacks. 

Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection, and response guidance leveraging a defense-in-depth approach. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment.

If you’d like to learn more, please download our MDR Guide, check out our Blog: MDR, What’s it All About, or contact us here. One of our cybersecurity experts will be more than happy to assist you and answer any questions you may have.

For Hurricanes and Cybersecurity Attacks, Awareness is Key

For Hurricanes and Cybersecurity Attacks, Awareness is Key

As a Louisiana company, we understand all too well the impact of Hurricanes; our thoughts are with friends and neighbors who are suffering the...

Read More
3 Things to Consider When Picking Antivirus Software for Home Use

3 Things to Consider When Picking Antivirus Software for Home Use

Today, with ever-increasing frequency, we see news stories about companies getting breached and personal data being stolen. New malware continues to...

Read More
A How-to-Guide for Multi-Factor Authentication

A How-to-Guide for Multi-Factor Authentication

Have you noticed how often security breaches, stolen data, and identity theft are consistently front-page news these days? Perhaps you, or someone...

Read More