Managed Security Service Provider
Outsourced monitoring and management of security devices and systems.
10 Benefits of Outsourcing Security Services
- Exceptional expertise usually reserved for large groups and large organizations;
- Modern and flexible approach with optimized cost;
- Simplification of security obligations (teleworking / on-site) for the departments;
- Increase employee productivity. The assets are more efficient, there is hardly any break in services;
- Maintaining good IT hygiene helps prevent most security incidents. But also to preserve its image with its customers and suppliers;
- Allows you to sleep with peace of mind. There are no more bad surprises;
- No major investment cost. CAPEX vs OPEX. The price is elastic, it depends on the number of machines and is smoothed monthly;
- No commitments, termination of the contract is possible with 30 days notice for most services;
- Resource appointed and available on demand at a frequency and pricing established at the beginning of the year. This makes it possible to react quickly without having to manage commercial contracts at a bad time. Only the volume of hours consumed is due;
- Benefit from competitive and negotiated group purchasing rates for all S3CUR1TY customers.
Managed security services
Asset inventory
- Inventory of assets (Mac and Windows, and network devices such as switches, dispatchers, printers),
- Management of Windows updates and patches,
- Management of third-party software updates,
- Supervision of the state of health of assets,
- Automation of hardening controls and adjustments,
- Access via 2FA,
- Reports.
Ransomware protection
- Reliable, incremental and outsourced backup of workstation and server files,
- Block-level backup,
- 256-bit AES encryption,
- Bandwidth limitation,
- Quickly deployable,
- Storage in Canada, United States, Australia or Europe,
- Simple setup and restore.
Event logging
- Collect logs and network metadata,
- Archive this information over 1, 3, 6 or 12 months in order to allow the digital forensic investigation,
- Basic alert in 8x5 with the possibility of extending to 24x7 on request,
- Detect anomalies and malicious behavior,
- Monitor file integrity (FIM),
- Respond to abnormal events by alerting and generating reports and graphs for in-depth investigation,
- Optional: Aggregation of logs from Microsoft 365 & 2h SLA commitment possible on request.
Centralized antivirus management
- Small performance footprint, transparent to the end user,
- Malware detection (viruses, malware, trojans, phishing, ransomware, spyware, browser-based attacks, cryptojacking, credential-stealing malware, etc.)
- Blocks advanced attacks (Evasion shield): Powerful heuristic blocking adjustable to the level of risk, Blocking of file-based and fileless script attacks, Blocking of JavaScript, VBScript, PowerShell, macros, malicious, Detect executed scripts, White list of legitimate scripts,
- 0-day multi-protection,
- Also manages the windows firewall.
EDR management
- Daily hunting down of positions already established in the environment and remediation if necessary: At start-up, At the connection of a targeted user, At the execution of a targeted process,
- Apply the principle of defense in depth by supplementing the antivirus in order to protect against malicious codes exploiting detection escape techniques,
- Reports on breaches treated.
Vulnerability management
- Regular scanning of vulnerabilities,
- Identify and monitor critical assets,
- Create advanced remediation groups,
- Prioritize remedies based on 18 contextual criteria,
- Humanly understandable report.
DNS filtering management
- Web classification and reputation services, the most effective way to block access to unwanted content and protect users against web threats,
- Frame a smart policy thanks to the 82 categories,
- Protect users in real time against the risks of connecting to any URL, regardless of their reputation,
- Allow blocking of online storage sites as well as personal email providers to prevent massive data leaks.
Systems hardening
- Based on the National Checklist Program (NIST) repository,
- Checks the configuration of certain technical security controls, system assessments and confirms compliance with certain federal laws or other sets of requirements,
- Provides a basic level of security to protect against common and dangerous local and remote threats (e.g. malware, denial of service attacks, unauthorized access and inappropriate use),
- Significantly reduces the time required to research and develop appropriate security configurations for installed IT products,
- Enables organizations to leverage external resources to implement security best practices.
Two columns
Vertical
Horizontal
Estimation
Monthly fee
{{field.label}}
{{ field.converted }}
{{ field.extraView }}
{{option.label}}
{{ option.converted }}
{{item.label}}
{{ item.data.converted }}
"{{getWooProductName}}" has been added to your cart
pro
Feature Available
in Pro Version
in Pro Version
in Pro Version
in Pro Version
[contact-form-7 404 "Not Found"]
Name
Email
Phone
Message
Payment methods
pro Feature Availablein Pro Version
Credit Card details
pro Feature Availablein Pro Version
:
{{ $store.getters.getIssuedOn }}
Payment method:
{{ $store.getters.getPaymentType }}
{{ item.label }}:
{{item.converted}}