Marathon Health Knowledge Base

How are security threats and vulnerabilities monitored?

Written by Marathon Health | Aug 27, 2024 2:21:00 PM

The vendor should actively monitor its environment for security threats using advanced behavioral and analytical technologies. For example, Marathon Health has engaged a service provider to provide logging and Threat Hunting and Response (TH&R) to provide visibility into our security posture. The THR provider’s security operations center (SOC) and Marathon Health actively monitor, respond, classify, remediate and mitigate vulnerabilities.

Rob Boschen, Vice President IT Operations & Security, Marathon Health