<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Services on Latacora</title><link>https://www.latacora.com/services/</link><description>Recent content in Services on Latacora</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><atom:link href="https://www.latacora.com/services/index.xml" rel="self" type="application/rss+xml"/><item><title>Virtual CISO</title><link>https://www.latacora.com/services/vciso/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/vciso/</guid><description>&lt;h2 id="mapping-your-security-posture" class="heading-with-anchor"&gt;
&lt;a href="#mapping-your-security-posture" class="heading-anchor-link" aria-label="Link to Mapping your security posture"&gt;
Mapping your security posture
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Latacora engagements begin with getting to know your overall security posture.
Latacora&amp;rsquo;s Security Architecture Review (SAR) process is a broad-spectrum,
holistic look at your organization&amp;rsquo;s information security risks. This allows us
to collaboratively drive priorities based on the risks presented by your
current security stance, rather than being solely based on hunches or findings
devoid of context.&lt;/p&gt;</description></item><item><title>Risk &amp; compliance</title><link>https://www.latacora.com/services/risk-and-compliance/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/risk-and-compliance/</guid><description>&lt;h1 id="risk--compliance" class="heading-with-anchor"&gt;
&lt;a href="#risk--compliance" class="heading-anchor-link" aria-label="Link to Risk &amp;amp; compliance"&gt;
Risk &amp;amp; compliance
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;If SOC 2 is on your roadmap, we’re here to help! Substantially all of our
clients either have a SOC 2 or are in the process of getting one, and we’re a
key partner in making that happen. We’ll help figure out where you’re at
process-wise, gauge your current readiness, and deliver actionable steps to get
you ready for your audit. If you have timelines for SOC 2 in mind, we’ll also
help figure out how realistic they are.&lt;/p&gt;</description></item><item><title>Sales enablement</title><link>https://www.latacora.com/services/sales-enablement/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/sales-enablement/</guid><description>&lt;h1 id="summary" class="heading-with-anchor"&gt;
&lt;a href="#summary" class="heading-anchor-link" aria-label="Link to Summary"&gt;
Summary
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Make security a part of closing more deals and close deals faster&lt;/li&gt;
&lt;li&gt;We handle vendor security questionnaire answering, including knowledge base
maintenance and prep work&lt;/li&gt;
&lt;li&gt;We&amp;rsquo;ll jump on sales calls to help close critical deals&lt;/li&gt;
&lt;li&gt;Working with GTM strategy to make sure your security is being fully leveraged
for your prospective customers&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id="vendor-security-questionnaire-support" class="heading-with-anchor"&gt;
&lt;a href="#vendor-security-questionnaire-support" class="heading-anchor-link" aria-label="Link to Vendor security questionnaire support"&gt;
Vendor security questionnaire support
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;Many of our customers are inundated with vendor security questionnaires. This
is a great problem to have, but it&amp;rsquo;s hard to scale. Questionnaires answered by
people without the right expertise won&amp;rsquo;t fly with your most discerning
customers, and questionnaires answered by your key staff will quickly drain
their productivity. We help our clients streamline this process, and enable
their sales teams to quickly and accurately respond to these requests.&lt;/p&gt;</description></item><item><title>Application security, cryptography &amp; SDLC</title><link>https://www.latacora.com/services/appsec/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/appsec/</guid><description>&lt;h1 id="application-security-cryptography--sdlc" class="heading-with-anchor"&gt;
&lt;a href="#application-security-cryptography--sdlc" class="heading-anchor-link" aria-label="Link to Application security, cryptography &amp;amp; SDLC"&gt;
Application security, cryptography &amp;amp; SDLC
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;Most of our clients build software, and we&amp;rsquo;re here to help them do that safely.
We help clients build out a program that&amp;rsquo;s both effective and unobtrusive. We
help you incorporate security throughout your systems development lifecycle via
a combination of tooling and processes.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ll review design documents and code as it gets developed. As your new
feature takes shape, we&amp;rsquo;ll design and execute an appropriate security testing
plan. Rather than performing monolithic tests and generating one-off
&amp;ldquo;Pentesting&amp;rdquo; reports that are out of date within days or weeks, we&amp;rsquo;ll generate
documents demonstrating an ongoing security review and assessment program that
goes far beyond a performative checkbox approach.&lt;/p&gt;</description></item><item><title>Detection &amp; response</title><link>https://www.latacora.com/services/detection-and-response/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/detection-and-response/</guid><description>&lt;h2 id="executive-summary" class="heading-with-anchor"&gt;
&lt;a href="#executive-summary" class="heading-anchor-link" aria-label="Link to Executive summary"&gt;
Executive summary
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Latacora provides a cost-effective, transparent, low-commitment detection &amp;amp;
response program.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Scalable and predictable pricing&lt;/li&gt;
&lt;li&gt;Complete: includes visibility tooling (such as &lt;abbr title="Security
Information and Event Management"&gt;SIEM&lt;/abbr&gt;, &lt;abbr title="Endpoint
Detection &amp; Response"&gt;EDR&lt;/abbr&gt;, email security) and combines detection
engineering, incident response, endpoint detection &amp;amp; response, and related
tools and services to make them effective&lt;/li&gt;
&lt;li&gt;Month-to-month, no long-term commitments, like the rest of Latacora&lt;/li&gt;
&lt;li&gt;No surprise fees (for example, investigation tool SKUs, Latacora
infrastructure costs… are all included)&lt;/li&gt;
&lt;li&gt;A broad range of technical and legal expertise&lt;/li&gt;
&lt;li&gt;Proprietary Latacora tooling empowers detection &amp;amp; response teams to do things
they otherwise could not, such as examine complete historical resource graph
snapshots of Cloud environments to inform investigations&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="approach" class="heading-with-anchor"&gt;
&lt;a href="#approach" class="heading-anchor-link" aria-label="Link to Approach"&gt;
Approach
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Building and scaling an effective detection &amp;amp; response practice is a complex
ordeal. There is an entire alphabet soup of industry marketing terms (SIEM, IR,
EDR, MDR, XDR, SOAR…) with subtly different and overlapping interpretations
across different vendors. We&amp;rsquo;ve leveraged our economies of scale and broad
range of expertise to design a solution to these problems. We can serve even
the smallest clients with a broad range of capabilities that would be out of
reach for those clients independently.&lt;/p&gt;</description></item><item><title>Infrastructure security</title><link>https://www.latacora.com/services/infrasec/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/infrasec/</guid><description>&lt;h2 id="infrastructure-security-monitoring" class="heading-with-anchor"&gt;
&lt;a href="#infrastructure-security-monitoring" class="heading-anchor-link" aria-label="Link to Infrastructure security monitoring"&gt;
Infrastructure security monitoring
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;We continuously monitor your infrastructure by taking regular snapshots of
resource configurations. Through rule-based analysis of those configurations,
we can identify, quantify, and help you manage all sorts of risk.&lt;/p&gt;
&lt;p&gt;Because we store that historical data, not just findings, we can leverage that
data for more than just identifying vulnerabilities or quantifying risk at a
given point in time. For example, we&amp;rsquo;ve worked with clients to help explain how
their environments have changed over time, or explain how certain assumptions
they made about their environments stopped being true. Additionally, we can use
this information to support other efforts, like compliance (like providing
evidence that certain standards were met historically, even after the fact) or
incident response (like checking the state of potentially compromised
infrastructure when it was compromised). You can read more about our approach
to building security tooling on our
&lt;a href="https://www.latacora.com/blog/2023/11/01/our-approach-to-building-security-tooling/" target="_self" rel=""&gt;blog&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Managed IT</title><link>https://www.latacora.com/services/managed-it/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.latacora.com/services/managed-it/</guid><description>&lt;h2 id="lightweight-it-support-where-it-matters-most" class="heading-with-anchor"&gt;
&lt;a href="#lightweight-it-support-where-it-matters-most" class="heading-anchor-link" aria-label="Link to Lightweight IT support where it matters most"&gt;
Lightweight IT support where it matters most
&lt;span class="heading-anchor-icon" aria-hidden="true"&gt;#&lt;/span&gt;
&lt;/a&gt;
&lt;/h2&gt;
&lt;p&gt;Many of our customers find themselves in the situation where an engineering or
tech leader has to wear an IT hat for a fraction of their week. This results in
the classic case where your IT challenges fall off the radar or relegate to
your third or fourth priority. The standard solution is to hire an MSP - but
many fall short of taking the management load off your plate - consuming
considerable hours but requiring you or your team to continue to don the IT hat
to tie up loose services.&lt;/p&gt;</description></item></channel></rss>