WHY USER SECURE?

Ransomware, phishing, whaling, spam and malware are at the forefront of every security conscious customer today. These threats are becoming more and more prevalent in our work and personal lives with daily reports of new infections.

The reality is that the traditional way of doing security is simply not effective enough against these types of threats as they are specifically targeting the endpoint and the user.  Traditional IT security mechanisms are focused on protecting the network and therefore a new User centric approach is needed.

With User Secure our approach is to begin with providing the user, regardless of company size, sector, budget or operating territory with effective protection against the three primary cyber-attack vectors.  These are mail, endpoint and web.  The service is provided on a monthly consumption basis with no minimum user commit and low to no implementation fees.

THE PROBLEMS WE SOLVE.

Our approach is to ensure user protection regardless of where the user is.
The best way to do this is with a three prong approach to secure:

    • e-Mail
    • Web
    • Endpoint
  • E-mail security
    • e-Purifier Enterprise with Advanced Threat Protection
  • Endpoint Anti-Malware
    • Managed Anti-Malware installed on all endpoint devices
  • Web Security and control
    • Web Security technology with option for browsing control installed as part of the anti-malware to protect against web threats
  • Monthly Cyber Health report
    • To highlight missing patches and security updates which will assist your IT team to ensure best possible protection against both known and unknown threats.

Security components can be selected to compliment the base service and add additional security for the business, detail on these is as follows:

  • Cloud Backup
    • Options for documents only or full endpoint backup, dependent on your budget and specific business requirements.
  • E-Mail archiving (MailVault)
    • To ensure and auditable and always available copy of all e-mail communications for the organisation.
  • Endpoint Detection and Remediation (EDR)
    • Advanced zero day detection of potential malware and advanced threats to the endpoint installed on the endpoint in addition to the Anti-Malware technology
  • Enterprise Mobility Management
    • Extend the security mechanisms to all devices within the organisation. This includes options for Secure Mail, Secure File access and Secure Web browsing from mobile devices.
  • Mailbox hosting services
    • With both local hosted exchange and Office365 as available options we are able to provide you with enterprise grade mail hosting facilities to optimize the way in which you collaborate and communicate as a business.
  • Advanced Web Security and Control
    • Complete protection and visibility into not only web browsing but also cloud application usage and control for the organisation.  Provided as a cloud service with no requirement for onsite hardware.
  • Endpoint Encryption *
    • Options for full disk as well as file encryption delivered from the cloud without the need for complex and costly onsite hardware and software.

Additional services which can be added to increase security:

  • Cloud Backup – documents only
  • Cloud Backup – Full desktop backup
  • E-mail Archiving – MailVault
  • Endpoint Detection and remediation – EDR
  • Enterprise Mobility Management
  • Mailbox hosting services
  • Endpoint Encryption
  • Advanced Web Security reporting and control

THE CLOUD
IS IN OUR DNA.

GET STARTED