Untitled Document
LMNTRIX
Twiter LMNTRIX
Linkedin LMNTRIX
Crunchbase LMNTRIX
Facebook LMNTRIX
HOW WE DO IT
- PEOPLE -
People are the most important aspect of LMNTRIX. It’s a cliché in virtually all areas of business, but it’s true.
In cyber defense one good analyst can do the job of 100 mediocre ones and so at LMNTRIX the quality
of our intrusion analysts is vastly more important than analyst quantity.
Moreover, while analysts can be trained to use a tool in a rudimentary manner, they cannot be trained in the mind-set or critical thinking skills needed to master the tool. As such at LMNTRIX we exercise great care in hiring and retaining our intrusion analysts.
A typical intrusion analyst at LMNTRIX is skilled in software development, scripting, ethical hacking, forensics, incident response, malware & threat analysis, reverse engineering, threat intelligence, PCAP analysis, network security and possesses multiple GIAC certifications.
To summarize
.01
Our team comes from diverse backgrounds,
possesses deep experience in IT, offense & defense
.02
We look for
out-of-the-box thinking like the adversary
.03
Our team understands
our mission and our customers networks
.04
We look for people who can build trust,
credibility, strong customer connections
.05
We hire for
Quality not Quantity
PROCESSES
While clearly defined processes are fundamental to achieving repeatable outcomes, at LMNTRIX we also understand that processes may need to be updated rapidly in response to new intelligence.
TECHNOLOGY
ADAPTIVE THREAT RESPONSE PLATFORM
Often times, the difference between preventing a cyber attack or suffering a crippling loss is simply knowing
where to look for the signs of a compromise.
DATA CENTRES,
SECURITY & CERTIFICATIONS
The LMNTRIX Adaptive Threat Response platform is hosted on Amazon Web Services; however, our platform can also be deployed in-house if there are security compliance regulations or audit standards that preclude you from using cloud services.
CYBER
DEFENCE CENTRES
At the core of our CDC is a strong foundation for operational excellence driven by well-designed and executed processes, strong governance, capable individuals and a constant drive for continuous improvement to stay ahead of the cyber adversaries
Privacy Statement | Terms of Use