Service Overview

The Advanced Security Suite is a comprehensive cyber security service, protecting your business against a wide range of threats. It includes

Service Detail

Account Management

Dedicated account manager Included
Security posture report Monthly
Access to Hub 365, our unified portal showing incidents and management information Included
Quarterly business review Quarterly
Dedicated technical advisor As needed

User Support

End user support Not included*
Escalation support for Primary Contact and/or internal IT team Included

*End user support is included if purchased with EliteSupport.

Endpoint Detection & Response

Limited to one per device per user.

Our EDR platform unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

Poweful & lightweight agent powered by SentinelOne Included
Autonomous multi-layered prevention that covers all attack vectors, even when offline Included
Machine learning technology that does not rely on signatures and does not require daily/weekly updates or recurring scans Included
Mitigation of the full context of malicious activity, reducing time and cost of fixing up infected devices Included
Security Operations Centre (SOC) triages alerts with full threat visibility 24x7x365 Included

 

Dark Web Monitoring

Our service is designed to help customers detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks,
forums, private networks, and other blackmarket sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII)

Continuous searching and monitoring of your digital credentials on the Dark Web. Real-time
Identity compromise notification and assistance Included
Identity Breach Reporting Monthly

Security Awareness Training

Our platform delivers simulated phishing attacks and security awareness training campaigns designed to educate employees, making them the best defense against cybercrime.

Simulated phishing attacks – scheduled phishing campaigns to send at random times during a specified period. This prevents the “prairie dog effect” of employees warning one another that they’ve received a phishing email, which provides truer measurement of employee awareness Weekly
Video-based Security awareness training – easy-to-understand, short and visually engaging training videos with an online quiz to verify the employee’s retention of the training content. Monthly

 

Internet Security & Content Filtering

Intelligent A.I. Internet Security and content filter scanner and classifies web traffic in real-time.

Agent-based DNS-based content filtering and threat protection Included
Real-time Interstitial Filter – When users on our platform access a domain which has never been seen, the scanner performs a realtime classification. The domain is fetched, categorized, and then matched against the policy set by the organization to determine if the user is allowed access. It’s like browsing the internet with a policeman, who looks down every dark alley ahead of you Included
Real Time A.I.Categorization – artificial intelligence engine, which classifies domains in real time. When your users visit a domain, our scanner fetches it and classifies it immediately. Included
Feed Augmentation – The engine incorporates peering sources from multiple security feeds, ensuring Botnet, Cryptomining, and Malware threats are mitigated. Partnerships with organizations such as New Scotland Yard and the Internet Watch Foundation ensure that we cast a wide net for Terrorism & Abuse websites. Included

 

Cloud Email Security

Simple, Powerful, Automated Email Security Software Against Phishing & Social Engineering Attacks

Cloud-based email security protection Included
Native intergration with Exchange Online Included
Protection against:
Phishing and Spear Phishing (Credential Theft)
Business Email Compromise (Social Engineering Scams)
Impersonation Attacks (Executive Spoofing, Trusted Sender Spoofing, Domain Spoofing)
ATO – Account Take Over (Attacks originating from compromized accounts)
Malicious URL (Sites distributing ransomware/malware)
Threats unique to your organization (Threat Modeling)
Included
Auto-Response Capabilities:
Auto-Quarantine emails detected as confirmed attacks
EmployeeShield® applied to highly suspicious messages to engage and leverage employees
1-Click Delete to delete email from all recipients’ inbox
Included
Forensic Investigation Capabilities:
Message Analysis
Header Analysis
On-demand Sandboxing for URL & attachment
Included
Support Scope:
Policy Tuning
Message traceOn-demand Sandboxing for URL & attachment
Included