Endpoint Protection Suite

Working from your home, Office or your local coffee shop is no longer a risk

Plans:
Security Operations Center
Threat Defense System (XDR)
Managed Threat Response Team
Full System Encryption
Password Management
Remote Monitoring & Management
Vulnerability Management Team
Attack Surface Reduction
Breach Warranty (up to $1 mil)
Full Security

Security Plus

Security Essential

Self Managed

*Full Security Package Pricing eligibility requirements: Based on 1 security standard and 1 OS type, minimum 35 systems, systems less than 6 years old

*All Packages: Workstations only, please contact us for server management, must have or be working toward either a Cybersecurity program or Cybersecurity Insurance requirements.

*Breach Warranty available on terms plans only 1-3 years

Security Operations Center

With your cloud based SOC, you have an adaptive cybersecurity ecosystem that boasts 530,000 customers globally

Lab researchers are constantly adding analysis of file behaviors URL, IoC, DPI to your SOC

AI Data scientists are continually developing advanced machine learning models, automation and detection for your SOC 

Carry out and customize your own investigations / detections and view threat graphs from the SOC’s Threat Analysis Center

Threat Defense System (XDR)

Extended Detection and Response (XDR) is a consolidation of tools and data that provides extended visibility, analysis, and response across networks and clouds in addition to apps and endpoints. XDR uses security telemetry to improve detection and remediation efforts over antivirus. It is a more sophisticated and advanced progression of Endpoint Detection and Response (EDR). Once deployed, your systems will be automatically enrolled in our Security Operations Center (SOC) where all endpoints are securely managed.

Deep Learning, Artificial Intelligence
Web & Network Protection
Extended Features

Managed Threat Response Team

Visibility is given to a highly-trained team of threat hunters, engineers, and ethical hackers for investigating and responding to threats.

The MTR team has insights and alerting that ensures that they are on top of an attack before you know that there is a problem.

Managed Threat Response (MTR)

This is a 24 hour a day 7 day a week service

This Team proactively hunts for and validates potential threats and incidents

Use all available information to determine the scope and severity of threats

The Team initiates actions to remotely disrupt, contain, and neutralize threats

Attack Surface Reduction

Attack Surface Reduction is minimizing the total number of entry points to your systems leaving attackers with fewer ways to preform attacks.

As much as each Compliance Standard allows flexibility in the approach taken to remedy a particular problem, Technical Controls are used to ensure that these have been addressed. 

Simply let us know what Compliance Standard you adhere to or would like to adhere to and we will harden your systems to this specification. This will resolve all your endpoint compliance Technical Control needs, manpower, and evidence collection for your internal compliance and auditors. 

Endpoint Hardening to your Compliance Standard – Options

Vulnerability Management Team

Over time our Operating System (OS) or an installed application will be exploitable.

Your endpoints attack surface is already reduced by controls covered from the Threat Defense System and Attack Surface Reduction. Even with these controls intact all that is needed is an out of date OS or an installed application that has a Common Vulnerability and Exposure (CVE), for your systems to be vulnerable.

Our Vulnerability Management Team actively scans for CVE’s on your systems and takes action to resolve them.

Common Vulnerability and Exposures (CVE)

Remote Monitoring and Management

We collect system metrics to ensure good performance and health of the system and alert you to issues before they become a problem. 

Alerting on system metrics like “Memory or CPU usage is inexplicably high” or “your hard drive is failing” and your employees are not able to work due to a problematic system. 

All systems are enrolled in RMM to reduce downtime for your company. 

Password Management

Cybersecurity Compliance Services approach includes the use of a Password Manager. Endpoint management needs to encompass the user. Common complexity rules require users to have 14 character strings “S4qB6YZ&&77mAg” to be able to login to company resources. Password managers allow users to generate, store and retrieve such passwords in a safe manner.

Our password Manager not only allows a safe place for account storage and ease of account login but also gives insight into Data Breaches and potential issues like: