Essentials delivers an adaquate level of protection against the most common threats, malware and internet attacks. This should be the minimum level of protection for any business.
Advanced is our most popular managed security package. It enhances our Essentials package through the addition of MFA, advanced firewall services and pro-active Dark Web monitoring.
Professional is our most advanced service, combining all of features with with detailed file and user activity monitoring, insider threat protection and advanced cybersecurity reporting.
Our packages are priced per user, and based on a 12 month minimum term. All support, monitoring and maintenance is included in this price.
Endpoint ProtectionSophos Endpoint to protect desktops, laptops and servers
Secure Internet GatewayMalware protection, block high risk websites, control internet access and monitor internet usage.
Next Generation FirewallFortinet Next Generation firewall protection and secure remote access
Multifactor Authentication (MFA)Multi-Factor Authentication (MFA) for Office 365, RDS, Desktop and Remote-Access/VPN
Dark Web MonitoringContinuous monitoring of company credentials and domain names on the Dark Web
Vulnerability AssessmentNessus external vulnerability scanning of company network assets to identify weaknesses, flaws or other high risk factors
Advanced Malware Protection‘Intercept-X’ Behaviour based anti-malware protection for servers, desktops and laptops. Provides the highest levels of endpoint protection.
File Access MonitoringContinual monitoring of company data on file servers; audit file access events, time of day access, staff copying or accessing data.
User Activity MonitoringMonitor user sessions, failed authentication attempts, time of day access, concurrent logins and other activity relating to your users
Helpdesk & Technical SupportAccess to our helpdesk and technical operations team.
Executive ReportsCybersecurity reports indicating the overall security posture of the business and highlighting any events for the period
Access to individual reports
Comprehensive Monthly Report
Sophos Endpoint protects customer desktops, laptops and services against advanced virus and malware threats. As a managed service, we are responsible for the installation, configuration and monitoring of the endpoint solution. If a device suffers an infection, Sophos identifies a threat or detects an anomaly – MTG are on-hand to respond and quickly resolve the situation.
Cisco Umbrella – Secure Internet Gateway
Umbrella acts as a gateway between the internet and your business systems and data to block malware, botnets and phishing over any port, protocol or app. The system will also detect and contain advanced attacks before they can cause damage to your systems or network. Umbrella can also detect and block cloud applications and control which website categories your staff are permitted to access. Read More
Next Generation Firewall
Firewalls are the key defence system that protects your business from internet borne threats. Next Generation Firewalls (NGFW) go beyond traditional network security; blocking malware and viruses, intelligently identifying and protecting against attacks and providing a real insight into your network’s activity. With SECaaS – we provide a fully configured firewall to work with your business internet connection, safeguarding your network from internet threats and facilitating secure remote working. Read More
Multi-Factor Authentication (MFA)
MFA enhances the security of your organisation by adding an extra level of security beyond passwords. Whenever you login to your systems or access the office remotely, rather than relying solely on your password – you will also receive a prompt on your mobile device to confirm access. MFA helps eliminate brute-force and password guessing attacks against your company. Read More
Dark Web Monitoring
Our dark web monitoring service provides continuous searching, monitoring and reporting of your company’s email credentials on the Dark Web, 365 days a year. The system searches the deepest parts of the Dark Web to proactively try and identify if your company or a member of staff may have experienced a breach. Around 70% of people tend to use the same passwords across systems, our Dark Web monitoring service helps identify leaks that may impact the integrity of your systems. Read more
A vulnerability assessment scans your network and internet facing systems for vulnerabilities, insecure configurations, out of date patches and other security issues. Applying the same scruntiy as the payment card industry, our vulnerability scans provide peace of mind, by undertaking a quarterly check of your network.
File Access Monitoring
The file access monitoring platform takes a birds eye view of the entire file and folder structure within your business. The system identifies unusual behaviour such as staff copying many documents, unauthorised access attemtps, out-of-hours activity and other activity that can be deemed unusual. This helps safeguard against the insider threat, data theft, exfilitration and the symptoms of ransomware attacks.
User Activity Monitoring
Your users may access your systems using a variety of ways; wireless access, plugging into your network or remotely accessing your systems from home or whilst on the road. User Activity monitoring keeps track of the users accessing your network, where from, and on what device. The monitoring can track unusual behaviour such as invalid password attempts, users accessing other devices and multiple concurrent logins. This helps defend against the insider threat, hacking attempts and will help identify risk-factors already within your environment.