Cyber Security Bundles

All in one security solution.

Our sophisticated cyber security bundle solution is designed to cover all aspects of your security from endpoints, through infrastructure to your people. Bringing together the best-in-class proactive and automated solutions to provide the peace of mind you need to operate your business with minimum risk.

Cyber-crime dominates news channels. The more we rely on digital systems, the more crime moves from physical to virtual. We either sit back and wait for the inevitable compromise – email hack, or maybe worse – ransomware attack, or we take a proactive ‘safe as houses’ approach. We prefer the latter.

Cyber Security Bundles

Azure Premium P2

Enhances the already secure Microsoft 365 with the ability to configure risky sign-in policies and automate responses to such threats.

;

Endpoint Protection

Proactive and yet light footprint-based protection software solution that scans for malicious files and activity within your systems, along with web content and DNS filtering.

;

Data & Email Backup

Securely backup data within Microsoft 365, inc E-mail, Teams and SharePoint.

;

EDR & SOC

Highly configurable automated endpoint threat response software. Logs and alerts suspicious activity and provides 24/7 SOC team for rapid response to all threats.

;

Dark Web Monitoring

Proactively monitors the dark web for any leaked credentials related to a specific domain. Proactively alerts our support team. Test it here (CTA request form for us to provide sample DWM report)

;

E-Mail Filtering

Enhance Microsoft 365 E-mail, scanning all incoming and outgoing email for spam/viruses/malware. Automated litigation/hold and DR solution covering occasional 365 outages.  

;

Vulnerability Scanning

Proactive scanning of internal and external networks, inc endpoints within your organisation for any known vulnerabilities. Automated support ticket logging for rapid rectification.

;

Cyber Security Training

Manage human security risks via gap analysis questionnaire and provide tailored training for each member of your team. Automated spoof runs to ensure continued adherence to security best-practice methods.

;

Password Manager

Securely store passwords for both business and personal within an encrypted vault with the ability to share across individuals and teams.

 

;

Over the last 22 years from 2001 to 2023, cyber-crime has claimed at least 6.5 million victims with an estimated loss of nearly $26 billion over the same period

33 Billion Accounts Breached in 2023*

Every Week

Every Day

Every Hour

Every Minute

Azure Premium P2

This additional Microsoft security license further increases the security around Microsoft & Office 365. It enables our security experts to create highly detailed and customer specific conditional access policies, that will automatically enforce security policies and pre-defined actions immediately upon detection of increased risk, for example, should abnormal or higher risk sign-ins be detected.

Endpoint Protection

Endpoint AntiVirus provides a lightweight endpoint protection solution for laptops and PC’s. Unlike our Iglu solution. many modern AV solutions are cumbersome and severely reduce performance of the machine. Ours proactively monitors and deals with active threats, such as trojans and others endpoint viruses. Iglu endpoint protection further provides a DNS filter solution, enabling our security experts to implement ‘blocked’ and ‘permitted’ lists of sites that can/cannot be accessed, as well as making use of the standard, in-built content category blocking to reduce the number of inappropriate or compromised sites being accessed from company devices

Data & Email Backup

Secure online backups for e-mail, SharePoint, Teams.  The backup retention policies are:

3 daily backups and retain for 30 days.

After 30 days, the system saves one of those three daily backups per user.

After 90 days, the system saves one weekly backup per user.

After one year, saves one monthly backup per user

EDR & SOC

Endpoint Detection Response (EDR) connects to our highly proactive and robust Managed SOC (Security Operations Centre) solution. The solution automatically searches for threats and proactively secures and attempts to remedy without human interaction. The solution aggregates all log files from a variety of your systems and endpoints and interrogates for signs of security breach – suspect detections are flagged to our helpdesk system, creating a support requirement for urgent remediation

Dark Web Monitoring

To further reduce the risk of cyber threats introduced through human (employee) error, we include a solution that monitors the dark web for leaked credentials related to your primary email domain and addresses.

Should a leaked credential be identified, a ticket is logged in our helpdesk system, and ensures that the user is urgently informed to proceed in changing credentials associated with the leaked details.

During our initial requirement gathering, we will run an indicative search and report on any potential leaked credentials.

Email filtering

Mimecast acts as both an email spam/virus filter, and a disaster recovery solution for Microsoft 365. Should Microsoft experience a mass outage, emails will still function via the Mimecast webmail portal. Emails (incoming and outgoing) are archived for up to 7 years in line with FCA compliance regulations

Vulnerability Scanning

Our proactive vulnerability scanning tool, actively scans all machines for any known vulnerabilities that need to be addressed (unused or spurious software, security shortcomings, patch requirements etc). Once identified, the system automatically generates a service ticket in our helpdesk system, for our engineers to action and remedy.

Our VS tool, also scans the external IP of your office environment, including your website for any known threats, alerting our team to urgent remediation requirements.

Cyber Security Training

Companies often deliberate over the optimum way to ensure the risk that your employees represent to your cyber security is mitigated as best as possible.

Many cyber breaches initially gain access through employee and user error (via successful phishing attacks as an example), and the best way to mitigate this risk isn’t always clear. Until now.

Our security experts will implement and configure proactive cyber security training for your entire employee base, board and directors included. Each member of your team completes an initial security questionnaire, which informs and gears the subsequent and automated training to their specific areas of weakness.

These training courses are continually updated in line with the latest security trends.

We also proactively simulate phishing e-mail attacks. The results of these simulations provide invaluable data as to who clicked various links, who accessed the (unbeknown to them) simulation site, and who proceeds to full compromise (entering full security credentials). From this data, we then provide further training and simulated attacks until we can be sure the employee is compliant with the security levels required to protect your environment.

Password Manager:

The use of a highly secure password management software tool avoids users arbitrarily storing their passwords on their smartphone, a document on their desktop or a slip of paper in their wallet. Our solution provides a secure encrypted area where employees store passwords. Our security experts can further disable the ability for users to save to web browsers which increases security and reduces the likelihood of data leakage.

Future updates