Our Team

Our team has a broad set of skill sets to ensure we can meet your needs and goals:

  • Developers
  • Integrations/SIEM Experts
  • Industry Experts/IR/Security Practitioners
  • Technical Account Managers
  • Customer Operation Managers
  • Support (1st, 2nd, & 3rd Tiers)

Customer Success Pillars

Operations

SIEM and Fidelis Solutions Experts/ Client Advocate/ Deployments/ Integrations/ Acct Management

Customer Care

Tier 1, 2 & 3 Technical Support

Solutions Eng

Tier 3 Technical Support/ Build Custom Integrations & Feeds/Build Features

Professional Services and Education

IR Retainers, IR Engagements, Design/Execute Security Support Services for CSO customers

MDR & Threat Analytics

Managed Detection and Response to include Requests for Information/Threat Research/Threat Hunting

Seamless Experience

Customer Care

  • Proactive Communication
  • Timely Response
  • Multiple Methods to Contact Support
  • Multiple Levels of Support and Expertise

Fidelis Cybersecurity University

  • Focused Solely on Client Operations
  • Online Product Training Online Integrations Training
  • Live Webinar Training

Professional Service

Assist clients in maturing their Security Program Augment client resources through services:

  • MDR
  • Threat Hunting
  • Incident Response
  • Threat Research as a Service

Customer Success Offerings

Whether our customers have a simple or complex environment, Fidelis offers Technical Account Managers that will help operationalize Fidelis solutions and products in their environment. Our program includes program management, project management, deployment planning, and configuration of Fidelis products. This ensures everything is fine-tuned and optimized to our customer’s unique environments. Each Fidelis TAM has deep technical expertise and is able to guide our customers through deployments as well as provide security based consultative recommendations to help the customer recognize value and complete their missions.

TAMs are with our customers every step of the way. TAMs will ensure your requirements are met, and will provide customer advocacy to Fidelis Senior Staff, Engineering, and Product Management teams which allows our Organization to be flexible and result focused- because we recognize that our customers requirements and needs change with the threat landscape; and we are able to meet those ever changing requirements that are mission critical to our customers.

Fidelis provides multiple training options, courses, and resources to meet your needs. Fidelis customers have the option of taking online, self-paced training, as well as live, remote or in-person training, with different level courses designed to ensure you get the most value out of your Fidelis products. Whether you’re a new user or an experienced power user, Fidelis Cybersecurity University (FCU) has a course for you, including:

  • Overview Administrator and Usage courses for Fidelis Network, Endpoint and Deception
  • How to Conduct Investigations and Hunt for Threats with Fidelis Endpoint and Network
  • Advanced Deep Session Inspection Rule Writing for Fidelis Network

We are constantly developing new courses based on your feedback and the evolving security landscape. In addition to your classroom work, FCU provides a certificate of completion, access to course updates and changes, virtual lab environments to cement your learning, and access to educational webinars and on-demand product demonstrations.

LEARN MORE
  • Provides TI expertise/augments client staff
  • Allows a more formal method/response for clients to Request Information
  • Includes Request for Information, including information about credential dumps to news/events; Can include Malware Analysis and Threat Research from simple triage to advanced research (attribution).
Learn more

Fidelis Managed Detection and Response (MDR) delivers industry-best talent and solutions to proactively hunt threats, speed up investigations, and stop detected threats. Fidelis MDR can augment your existing SOC with proactive threat hunting or act as your trusted security team running the Fidelis Elevate™ platform. Gain a competitive edge with the benefits of unmatched security expertise and a unified security operations platform designed to protect the most complex environments.

LEARN MORE

Fidelis’ dedicated Incident Response team has decades of experience and has worked to remediate some of the world’s most high-profile security breaches. The team has responded to more than 4000 security cases in both the commercial and government sectors and has provided expert testimony in over 100 court proceedings. Our professionals can quickly identify and remove attackers from the environment, re-secure the enterprise and help your organization successfully recover from an incident.

LEARN MORE

Every customer environment is different with its own unique requirements. Fidelis engineers can deliver custom integrations and workflows for any requirements not immediately satisfied by out-of-the-box offerings. Workflows tailor the use of Fidelis solutions to the unique needs or pre-existing procedures present in a client environment, and integrations handle data input-output between Fidelis solutions and third party products.

Fidelis Cybersecurity University (FCU) offers world class training to support our suite of cyber security products.

FCU provides you with online and on-demand introductory courses hosted on our learning management system. These course are designed to get you “in the trenches” and working with alert data immediately.

We also offer “hands-on” public or private virtual/on-site instructor-lead advanced courses for our more technical and experienced users.

Learn more about our course offerings here.

Next Section

Course Descriptions

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • Gain an understanding of the technology, architecture and unique capabilities such as Deep Session Inspection.
  • Learn how to navigate the user interface, read and create alerts as well as policies that allow you to monitor and control what takes place in your environment.
  • Understand how to work with the rich, indexable metadata that is collected, how to search and filter data, and how to interpret the metadata to create rules to enhance the security of your network.

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • Gain an understanding of the Fidelis Endpoint architecture.
  • Learn about endpoint behavior monitoring and alert creation, and how to view and manage alerts.
  • Learn how to take action on suspicious behaviors through the use of threat intelligence and scripts.
  • Understand how agents are deployed onto endpoints, and how to manage user access and permissions.

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • Understand how to gain visibility and analyze your cyber terrain.
  • Learn how to create and deploy decoys and breadcrumbs.
  • Gain an understanding of how to view and understand alerts.
  • This course is being developed, but when available will provide students with the training to write rules in Fidelis Network based on use cases.
  • This half-day course is led by an instructor, who teaches students the basics of how scripts work in Fidelis Endpoint, including where they are stored, how they function and how they relate to playbooks and tasks.
  • This half-day course is led by an instructor, who teaches students the basics of how Threat Bridge works in Fidelis Endpoint. Students will participate in practical labs to create and edit custom Threat Bridge intelligence feeds and import existing feeds such as Threat Connect.

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • Designed as the next step after taking the Network Core course, this shows analysts through lecture, use cases and practical labs how to use Fidelis Network. This course includes instruction on alert triage, querying metadata, understanding analytic rules, hunting for threats, writing rules, and concludes with a capstone exercise.

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • Designed as the next step after taking the Endpoint Core course, this shows analysts through lecture, use cases and practical labs how to use Fidelis Endpoint. This course includes instruction on alert triage, behavior rule writing and modification, hunting for threats, understanding of Fidelis Threat Bridge, and concludes with a capstone exercise.

Available as self-paced online via the Fidelis Learning Management System, or instructor-led (online or onsite). If necessary, a self-directed one day lab environment is included.

  • This instructor-led course provides students with the knowledge to write advanced Deep Session Inspection rules in Fidelis Network. This course includes lecture and practical exercises on areas, such as fingerprints, rule expression, whitelisting and analytical rules.
Access Fidelis Cybersecurity University