DEBUG: PAGE=domain, TITLE=Application Services,ID=1426,TEMPLATE=subprogram
toggle expanded view
programcode = ITSAPP
programid = 146
database = t
alerts = t
neat = t
vendors = t
forecasting = f
confidence = f
definitions = t

Search within: Application Services:

Access our analyst expertise:

Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.

To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.

Subscribe to blogs & alerts:

manage email alerts using the form below, in order to be notified via email whenever we publish new content:

has Database = t

Contracts Database

for Application Services

Track the pattern of service adoption by monitoring Application Services contract awards by your peers. Identify who are the successful vendors this industry now. Updated monthly!

These documents are available to logged in clients that have purchased access to this program.

has Confidence = f -- IGNORED

LTI - Cyber Resiliency

Vendor Analysis

by Mike Smart

published on May 10, 2019

Access to this report is restricted to logged in clients with access. Login to get full access

Report Overview:

This NelsonHall vendor assessment analyzes LTI’s offerings and capabilities in cyber resiliency.

Who is this Report for:

Across cybersecurity, LTI offers consulting, end-to-end deployment and management with services based around its Mosaic cyber analytics platform and secure customer portal.

In threat detection, LTI provides 24x7 monitoring/log management and SIEM on the client's environments using solutions such as QRadar, LogRhythm, LogLogic, and Splunk feeding data into the Mosaic cyber analytics tool. The Mosaic tool provides big data analysis and network behavior analysis and can automate some of the construction of threat detection and prevention rules. The Mosaic tool also ingests external threat information feeds for better detection of security events.

Through the Mosaic security client portal, clients can receive dashboards on its security risk posture, view logs of security events, and the response to incidents. For a response to incidents, the client receives security incident reports containing details, risk and remediation status risk, compliance reports, and management information system (MIS) report.

To assist in deploying a SIEM quickly and in a best practice configuration, LTI has 200 predefined use cases available and accelerators for more than 300 data sources.

LTI has ~700 FTEs providing cyber resiliency services out of its three cyber defense centers; two in India, one in Canada. The centers operate in a follow-the-sun methodology with the center in Canada passing event monitoring and response workloads to India.

Scope of this Report:

The report provides a comprehensive and objective analysis of LTI’s cyber resiliency offerings and capabilities, and market and financial strengths, including:

  • Identification of the company’s strategy, emphasis, and new developments
  • Analysis of the company’s strengths, weaknesses, and outlook
  • Revenue estimates
  • Analysis of the profile of the company’s customer base including the company’s targeting strategy and examples of current contracts
  • Analysis of the company’s offerings and key service components
  • Analysis of the company’s delivery organization including the location of delivery locations.

Key Findings & Highlights:

This NelsonHall vendor assessment analyzes LTI’s offerings and capabilities in cyber resiliency.

Across cybersecurity, LTI offers consulting, end-to-end deployment and management with services based around its Mosaic cyber analytics platform and secure customer portal.

LTI's cybersecurity services can roughly be split across:

  • Cybersecurity services
  • Digital security services
  • Cyber GRC
  • Digital identity services.

LTI has ~700 FTEs providing cyber resiliency services out of its three cyber defense centers; two in India, one in Canada.

Login to get full access:

close