Frequently Asked Questions
Answers to common questions about our cybersecurity services, engagement models, and technology platform.
General
Dalwax is a full-spectrum cybersecurity services company providing managed security services, SOC operations, incident response, penetration testing, cloud security, GRC, and vCISO advisory to enterprises across healthcare, financial services, government, and critical infrastructure sectors.
Dalwax maintains SOC 2 Type II, ISO 27001:2022, ISO 27701, FedRAMP authorization, CREST accreditation for penetration testing, and PCI QSA qualification. Our team holds 800+ individual certifications including CISSP, OSCP, GIAC, CISM, and cloud security specializations.
We serve healthcare, financial services, government (federal/state/local), education, manufacturing, retail, and energy/utilities. Each industry practice has dedicated specialists who understand sector-specific regulations and threat landscapes.
IR retainer clients receive a 60-minute response SLA. Emergency engagements are typically initiated within 2-4 hours. Our IR team is available 24/7/365 via our emergency hotline at +1 (800) 329-5291.
Services & Engagement
Traditional MSSPs focus on alert monitoring and forwarding. Dalwax's Managed Detection and Response (MDR) includes proactive threat hunting, automated response, full investigation, and continuous detection engineering. We don't just notify you of alerts — we investigate, contain, and remediate threats on your behalf.
Yes. Our platform integrates with 400+ data sources including all major SIEM platforms (Splunk, Sentinel, Chronicle), EDR solutions (CrowdStrike, Defender, SentinelOne), cloud providers (AWS, Azure, GCP), identity providers (Okta, Entra ID), and ITSM tools (ServiceNow, Jira).
Standard onboarding takes 2-4 weeks depending on environment complexity. This includes data source integration, baseline establishment, custom detection rule development, and playbook configuration. Emergency onboarding for IR situations can be completed in 24-48 hours.
We offer three models: (1) Managed services with monthly subscription pricing based on endpoints/users/data volume, (2) Project-based engagements for pentests, assessments, and implementations with fixed-fee pricing, and (3) Retainer agreements for IR and vCISO services with prepaid hours and guaranteed SLAs.
Absolutely. Many clients start with a vulnerability assessment or penetration test, then expand into managed security services, compliance, and advisory. Our modular service architecture allows you to add capabilities as your security program matures.