Detect & Respond to Threats with Advanced Capabilities

Services that helps you identify, prioritise, and respond to potential security issues that pose the greatest risk.


Get expert analysis on the 11 most significant managed security solutions providers in North America from Forrester Wave™.


Analytics and Vulnerability Management

Even with the key network, infrastructure, data and application protections in place, organisations still struggle to mount effective cyberthreat defenses. Too much data to analyse, lack of contextual data from your security tools, too many false positives, not enough skilled security personnel to monitor and respond to incidents, and a lack of budget may act as major challenges to mounting effective security defenses. This is where CenturyLink's advanced threat detection and incident response services come into play. With detection and response services, you get the visibility you need to proactively identify potential security issues and respond to them before they can cause harm. And with the CenturyLink's Incident Management and Response services, you can ease the burden of having to develop and manage incident response in-house.

Our detection and response services cover a wide range of advanced capabilities:

Security Log Monitoring with Trending & Threat Analysis Sophisticated log ingestion, monitoring and event correlation, with a powerful data analysis engine.
Incident Management & Response Service A team of security experts who investigate incidents and proactively respond to possible attacks.
Vulnerability & Risk Monitoring Proactive scanning service that discovers and prioritises possible threats, eradicating them before impact.
Managed Protection Services An automated device monitoring and management service provides deep insights from next-generation firewall services.

Uncover Threats Before They Can Impact Your Business

You can't fix what you don't see. The detection and response suite keeps you aware of threats and provides the tools to eradicate them quickly. Benefits include:

An analytics platform and intuitive customer portal, which gives customers the ability to analyse data, report on potential threats and garner real-time insight into security events.

A flexible SIEM back-end, which can accept client-specific asset and vulnerability data from any location or alternative SIEM and provide insights on real-time threat activity.

More effective compliance capabilities, through a combination of human-powered and automated resources and tools that address the need for proactive log correlation and analysis, incident-response and continuous monitoring.

Better adherence to specific regulations, such as Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley (SOX) and Health Insurance Portability and Accountability Act (HIPAA), among others.

5 Security Lessons We Learned from 2015

The biggest reasons 2016 is the year to get serious about cybersecurity.

In 2015, far too many companies learned the hard way that cybersecurity, or the lack thereof, is a growing problem. As the cost of security failures continues to skyrocket, here are a few things you can guard against to avoid being the next headline.


Get started with these featured resources and tools.
Get Started

SALES: +61 3 9674 0470
SUPPORT: 1800 097 572

Get Connected. See What's Next for Business.