Managed IT Security
Small Business IT Security
Our managed security service is the ideal solution for a small business who wants to ensure their systems and data remain secure. Forming part of our managed services portfolio, the Managed Security service builds upon our IT Support solution and includes a carefully selected list of security software designed to safeguard your business.
Managed Security is perfect for a small business; highly effective at identifying and eliminating threats – and for a fixed monthly fee per user.
- Endpoint, Network and Server Security with Sophos Central.
- Secure Internet Access with Fortinet Firewalls and Cisco Umbrella.
- Protected network and systems access with DUO.
- Web Filtering and control access to Social Media.
- Monitor and control cloud application access.
- User and Data access monitoring with File Audit and User Lock.
- Vulnerability, security and Dark Web checks.
- 24x7x365 access to our IT Support helpdesk.
Enterprise Security Solutions
Enterprise customers can benefit from a range of flexible security solutions on a subscription basis, whether fully-managed, part-managed or supply only. If your internal IT team needs an extra resource, assistance with a specific project or if you require an independent review – this is an area where we can help. Our IT Support and 24x7x365 helpdesk are available around the clock to support your existing teams.
Features at a glance
Fixed Monthly Charge
Dedicated Account Manager
Managed Security Components
Cisco Umbrella – Secure Internet Gateway
Cisco Umbrella acts as a gateway from your network to the internet, protecting your users from high-risk websites and networks. Umbrella can also block access to cloud applications and websites, allowing you to maintain productivity or compliance with policies.
Sophos Endpoint protects your desktops, laptops and servers against advanced virus and malware threats. As a managed service, we are responsible for the installation, configuration and monitoring of the endpoint solution. If Sophos identifies a threat or detects an anomaly our team will respond for a resolution.
Next Generation Firewall
Firewalls are the key defence system that protects your business from Internet-borne threats. Fortinet Next-Generation Firewalls (NGFW) goes beyond traditional network security; blocking malware and viruses, intelligently identifying and protecting against attacks and providing enhanced network visibility. Read More
Multi-Factor Authentication (MFA)
DUO MFA enhances the security of your organisation by adding an extra level of security beyond passwords. Whenever you login to your systems, rather than relying solely on your password – you will also receive a prompt on your mobile device to confirm access. MFA helps eliminate brute-force and password guessing attacks against your company.
A vulnerability assessment scans your network and internet facing systems for vulnerabilities, insecure configurations, out of date patches and other security issues. Applying the same scrutiny as the payment card industry, our vulnerability scans provide peace of mind, by undertaking a quarterly check of your network using the Nessus scanner.
Dark Web Monitoring
Our dark web monitoring service provides continuous searching, monitoring and reporting of your company’s email credentials on the Dark Web, 365 days a year. The system searches the deepest parts of the Dark Web to proactively try and identify if your company or a member of staff may have experienced a breach. Dark Web monitoring service helps identify leaks that may impact the integrity of your systems. Read more
File Access Monitoring
IS Decisions File Audit monitoring platform takes a birds-eye view of the entire file and folder structure within your business. The system identifies unusual behaviour such as staff copying too many documents, unauthorised access attempts, out-of-hours activity and other activity that can be deemed unusual. This helps safeguard against the insider threat, data theft, exfiltration and the symptoms of ransomware attacks.
User Activity Monitoring
Users may access your systems using a variety of ways; wireless access, plugging into your network or remotely accessing your systems from home or whilst on the road. User Activity monitoring keeps track of the users accessing your network, where from, and on what device. The monitoring can track unusual behaviours such as invalid password attempts, users accessing other devices and multiple concurrent logins.