The vendor should actively monitor its environment for security threats using advanced behavioral and analytical technologies. For example, Marathon Health has engaged a service provider to provide logging and Threat Hunting and Response (TH&R) to provide visibility into our security posture. The THR provider’s security operations center (SOC) and Marathon Health actively monitor, respond, classify, remediate and mitigate vulnerabilities.

Rob Boschen
Rob Boschen, Vice President IT Operations & Security, Marathon Health