FAQs

FAQs

Service Questions

Who do we deliver services to?
We deliver services to companies of all sizes, we have small business customers through to global multi-national companies. We typically deliver services to IT Departments and technology teams and IT Service Providers.
How do you connect to our systems?
Factory takes security seriously, as such, if you already have a secure method of remote access we will use that where possible. This means you don't have to do anything special for us to connect to your systems.
How do we collect monitoring/log data from your systems?
Our systems run a small collection of agents which forward key event data onto our systems, this gives us insight into understanding what's going on with your systems, information such as performance, availability, system integrity and overall security posture can be understood quickly and securely. Our collection tools work across Windows, Linux, AWS, Azure, Google, Office 365 and more.
What is your tailored operations offering?
Our tailored operations offering is our most advanced delivery service. This service utilised all of our combined expertise across Architecture, Design, Implementations, Cloud, Network, Security and brings it into one package. Typically our customers in this area mix across Government, Telecom, Defence, Banking or industries that have unique platform and security requirements. Our services deliver platforms that are secure and resilient giving our clients confidence in their operations.
Can you support systems on our site?
Yes, our services can support systems spanned across on-premise, 3rd party hosted or public cloud based. We even have expertise in supporting and managing air-gapped/offline/control plane/tier 0 assets which operate in hostile network conditions. Typically MSPs cannot support these environments. Factory have a lot of expertise in supporting these environments and getting relevant expertise onto your environment in a secure and manner.
How do your security analytics offerings work?
We offer a unique SOC service that works on delivering value through combining data acquisition, threat hunting and threat intelligence along with machine learning to correlate patterns and understand your systems. We start to build a perspective of what normal looks like through observability, from that position, we can then start to spot dangerous behaviour that can negatively affect your business.

Technology Questions

Frequently asked questions

Does your SOC have an MDR/EDR/XDR Service?
Yes, we use our preferred tooling for this. Our tooling is always subject to change as threats evolve. We continually assess and test our EDR/XDR choices and ensure they're still market leading in terms of defensive capability.
Can you ingest logs from 3rd Party Cloud Services?
Yes, we have integrations to over 500 different technologies. We also have advanced in-house parsers which can ingest CSV, JSON and Text data meaning we can collect data from a very wide range of technologies.
Can you provide us with a cloud tenant and manage it?
Yes, we can provide you with an AWS, Azure or GCP tenant that we will then manage on your behalf. The tenant is always portable and can be passed to your business at a later date should that be required. We can also take on the management of existing tenant accounts by performing an initial audit.
My needs aren't so unique, can you still help?
Yes, we look after a variety of customers. Some have single Office 365 tenant accounts, some have a website and others have hugely complicated platforms that we keep working.
Can you ingest logs from Cloud Services Like Office 365?
Yes, we can connect to Azure/Office 365 to get logs using an EventHub connector. We can do this in different ways, but this is our preferred method.
I have an on-site requirement, how can you manage this?
We can deploy resilient systems that can run reliably in remote locations. In the most sensitive instances, we also assess and design power delivery, hvac and other ancillary system around the workload to ensure continued operation, even in challenging scenarios.
Can you SOC ingest logs from my on-premise devices?
Yes, we can deploy collectors into your network to get syslog data and other different feed data. We can also use these appliances to ensure key services are running as expected, security awareness for us also involves ensuring services are available.
What connectivity options do you offer?
We offer businesses connectivity using speeds from FTTC (up-to 80Mb/s) all the way through to 10Gb/s over a variety of mediums from fixed line, line of sight through to 4G/5G. We can offer fully managed LANs, WiFi along with cabling, patching, and in-ceiling/floor/wall installation of CAT6 from our fitting team.
How do I know my systems are being looked after? Who's responsible?
With any service in Factory, you are assigned a Two Service Contacts and two technical contacts as a minimum. In addition to this, you also have access to our 24/7 support desk and an escalation contact.