In dynamic co-management with your resources, the cybersecurity and cybercompliance experts on our TRAC Team monitor and manage your security and compliance  24 x 7 x 365 to identify and resolve millions of potential cyber threats. 

onTRAC Services

  • Trigger development and maintenance. Any trigger you create requires a discussion with TRAC to discuss expectations before it is actively monitored. 
  • Classifier development and maintenance
  • Log analysis
  • Threat Match verification/analysis
  • Gap analysis for potential instrumentation sources to improve visibility
  • Incident Management
    • Analyze and Remediate open incidents
    • Assigning to customer when further action is necessary

Additional Services

  • Virtual CISO: leverage strategic expertise of a Chief Information Security Officer without investing in full-time staff.
  • Vulnerability Management: stay ahead of potential and emerging threats across both your virtual and physical assets and properties.

Unavailable Services

Our TRAC Team can only provide recommendations for network changes, not execution. The following services cannot be completed by our team:

  • Add blocks to your Firewall
  • Block traffic 
  • Management of any device or appliance 
  • Create user accounts

What do we need from you?

 To efficiently monitor and analyze your network, provide the following:

  • Asset List
  • Network diagrams
  • Technical security controls inventory (NAV, AV, etc.)
  • User List (phone & email)
  • Security Policies
  • Incident Response Plan
  • Privileged Account Management
  • Third Party Vendor Management

Service Level Agreements (SLA’S)

The timelines listed in the table below are the maximum response times for our TRAC Team to initiate triage.

Guardian Security Monitoring Services SLA - Triage

System Generated Actionable Item


Response Time

System Incidents


2 hours


12 hours


Next Biz Day



Contact for Escalation Cases

In order to streamline the triage process, provide our TRAC Team with who to contact and when, by filling out the escalation use case chart. Below is an example of the chart.