Base Services

Description of Base Services

We offer 7 layers of protection

1. Information Security Policies

2. Physical Security

3. Network Security

4. Vulnerability Scanning

5. Strong Identity and Access Management (IAM)

6. Proactive Detection and Reactive Backup and Recovery

7. Continual Monitoring and Testing

Below is a complete run-down of the base services that we offer. Each service that is in blue text below is a PDF that you can download and get more information on.

Endpoint protection

    • Single, holistic agent for PC, Mac, Linux, VDI
    • Multi-layered AI-powered endpoint protection
    • Advanced Threat Hunting and device controls
    • Policy driven response to threa

Antihacking app for email security

    • Blocks specific and threatening traffic at the Exchange Server
    • Prevents specific filetypes from running
    • Blocks .exe files from running in known popular malware locations
    • Sets up alerts for Encrypted emails
    • Prepends encrypted emails with a “Suspicious Email:…” Subject line
    • Provides Companies with dashboard and metrics on employee malicious click patterns
    • Proprietary technology solution that reduces end user risk up to 95%

Automated documentation

    • Automated documentation that gathers and standardizes the way your systems’ data is stored
    • Actionable Alerts that let us know when something needs our attention
    • Reporting that goes across systems for a more holistic view of your business

Device warranty and maintenance reports service

    • Automated documentation that gathers and standardizes the way your systems’ data is stored
    • Actionable Alerts that let you know when something needs your attention
    • Reporting that goes across systems for a more holistic view of your business

Zero Trust Policy Driven Security

    • Per User Limits: Eliminate the need to grant blanket access as creates policies for organizations or unique users
    • Protect Remote Assets: is fully compatible with remote desktops and Citrix servers so employees can work securely from anywhere
    • Control of Unknown Apps: unobtrusively controls the applications of trusted visitors to prevent cybercriminals piggybacking in
    • Zero-Day Attacks: protects against vulnerabilities that haven’t even been discovered yet
    • Macro Viruses: Malware embedded in trusted programs like Office can’t overcome Ringfencing
    • Fileless Malware: Even malware that hides in memory can’t sneak in; if its code isn’t on the trusted list, it isn’t getting access
    • Ransomware: Ringfencing lets you dictate how apps interact with data; if a program, ANY program, tries to encrypt data it isn’t authorized to, it will be blocked
    • Track Permission Changes: If a user grants access to someone they should not have whether intentionally or not, you’ll know immediately
    • Control Physical Copying: With the right Storage Control policies in place, a bad actor on your premises with a USB drive won’t be able to copy a thing
    • Monitor Access: See who is accessing your files and when with detailed reports generated in real time by Overwatch
    • Restrict Applications: Let only trusted apps access your data, as determined by your custom policies
    • Track File Access: Get detailed, real-time reports on who accessed data and what they did with it
    • Track Changes and Deletions: Thorough records for any file type let you see the complete history of your data
    • Block Unauthorized Apps: custom policies let you block any apps you want, regardless of if they are malware or not

VPN/Proxy Employees connect from multiple devices, from various locations during all hours of the night and day. A Cloud VPN allows employees to securely access the organization’s private network through public networks and even share data remotely.

Monitoring and ticketing tools

  • Antihacking app for email security –
    • Blocks specific and threatening traffic at the Exchange Server
    • Prevents specific filetypes from running
    • Blocks .exe files from running in known popular malware locations
    • Sets up alerts for Encrypted emails
    • Prepends encrypted emails with a “Suspicious Email:…” Subject line
    • Provides Companies with dashboard and metrics on employee malicious click patterns
    • Proprietary technology solution that reduces end user risk up to 95%
  • Automated documentation
    • Automated documentation that gathers and standardizes the way your systems’ data is stored
    • Actionable Alerts that let us know when something needs our attention
    • Reporting that goes across systems for a more holistic view of your business
  • Device warranty and maintenance reports service
    • Automated documentation that gathers and standardizes the way your systems’ data is stored
    • Actionable Alerts that let you know when something needs your attention
    • Reporting that goes across systems for a more holistic view of your business
  • Zero Trust Policy Driven Security –
    • Per User Limits: Eliminate the need to grant blanket access as creates policies for organizations or unique users
    • Protect Remote Assets: is fully compatible with remote desktops and Citrix servers so employees can work securely from anywhere
    • Control of Unknown Apps: unobtrusively controls the applications of trusted visitors to prevent cybercriminals piggybacking in
    • Zero-Day Attacks: protects against vulnerabilities that haven’t even been discovered yet
    • Macro Viruses: Malware embedded in trusted programs like Office can’t overcome Ringfencing
    • Fileless Malware: Even malware that hides in memory can’t sneak in; if its code isn’t on the trusted list, it isn’t getting access
    • Ransomware: Ringfencing lets you dictate how apps interact with data; if a program, ANY program, tries to encrypt data it isn’t authorized to, it will be blocked
    • Track Permission Changes: If a user grants access to someone they should not have whether intentionally or not, you’ll know immediately
    • Control Physical Copying: With the right Storage Control policies in place, a bad actor on your premises with a USB drive won’t be able to copy a thing
    • Monitor Access: See who is accessing your files and when with detailed reports generated in real time by Overwatch
    • Restrict Applications: Let only trusted apps access your data, as determined by your custom policies
    • Track File Access: Get detailed, real-time reports on who accessed data and what they did with it
    • Track Changes and Deletions: Thorough records for any file type let you see the complete history of your data
    • Block Unauthorized Apps: custom policies let you block any apps you want, regardless of if they are malware or not
  • VPN/Proxy Employees connect from multiple devices, from various locations during all hours of the night and day. A Cloud VPN allows employees to securely access the organization’s private network through public networks and even share data remotely.
  • Monitoring and ticketing tools