USER / ENDPOINT
SECURITY.
WHY USER SECURE?
Ransomware, phishing, whaling, spam, and malware attacks are at the forefront of every security-conscious client today. These threats are becoming more and more prevalent in our work and personal lives with daily reports of new infections.
The reality is that the traditional way of doing security is simply not effective enough against these types of threats as they are specifically targeting the endpoint and the user.
Traditional IT security mechanisms are focused on protecting the network and therefore a new User-centric approach is needed.
With User Secure our approach is to begin with providing the user, regardless of company size, sector, budget, or operating territory with effective protection against the three primary cyber attack vectors. These are e-Mail, endpoint, and web. The service is provided on a monthly consumption basis with no minimum user commitment and low to no implementation fees.
THE PROBLEMS WE SOLVE.
Our approach is to ensure user protection regardless of where the user is. The best way to do this is with a three-prong approach to secure:
-
The Base Servicee-Mail security e-Purifier Enterprise with Advanced Threat Protection. Endpoint Anti-Malware Managed Anti-Malware installed on all endpoint devices. Web Security and control Web Security technology with option for browsing control installed as part of the anti-malware to protect against web threats. Monthly Cyber Health report To highlight missing patches and security updates which will assist your IT team to ensure best possible protection against both known and unknown threats.
-
Security ComponentsSecurity components can be selected to compliment the base service and add additional security for the business. Details on these is as follows: Cloud Backup Options for documents only or full endpoint backup, dependent on your budget and specific business requirements. e-Mail archiving (MailVault) To ensure an auditable and always available copy of all e-Mail communications for the organization. Endpoint Detection and Remediation (EDR) Advanced zero day detection of potential malware and advanced threats to the endpoint installed on the endpoint in addition to the Anti-Malware technology. Enterprise Mobility Management Extend the security mechanisms to all devices within the organization. This includes options for Secure Mail, Secure File access and Secure Web browsing from mobile devices. Mailbox hosting services With both local hosted exchange and Office365 as available options we are able to provide you with enterprise grade mail hosting facilities to optimize the way in which you collaborate and communicate as a business. Advanced Web Security and Control Complete protection and visibility into not only web browsing but also cloud application usage and control for the organization. Provided as a cloud service with no requirement for onsite hardware. Endpoint Encryption * Options for full disk as well as file encryption delivered from the cloud without the need for complex and costly onsite hardware and software.
-
Additional ServicesSecurity components can be selected to compliment the base service and add additional security for the business, detail on these is as follows: Cloud Backup – documents only. Cloud Backup – Full desktop backup. e-Mail Archiving – MailVault. Endpoint Detection and Response– EDR. Enterprise Mobility Management. Mailbox hosting services. Endpoint Encryption. Advanced Web Security reporting and control.