You can meet all your security responsibilities with our Managed Security Program. We purchase enterprise grade tools, deploy them on a multi-tenant basis and manage them 7x24x365. Tools and reports are configured to your needs. Monitoring, remote service tools and technician dispatch enable rapid response. Monthly reports, documentation and vulnerability testing ensure compliance. We are security service experts leveraging economies of skill and scale. You get a comprehensive security program at a reasonable cost. Your risks are reduced, compliance obligations met and costs contained.
Our Managed Security Program has four pillars: 1. Internal Protection, 2. External Protection, 3. Monitoring and 4. Vulnerability Testing. Internal protection is a relatively new security imperative. Over 60% of all breaches now stem from employees. External security protection has evolved from firewall maintenance to include pre-emptive initiatives to stop attacks before they reach you. Monitoring must be comprehensive, but must not yield mountains of raw data. Monitoring must be 7×24 and the results must be interpreted. Vulnerability testing will be done on a semi-annual basis. More detail on our security program is included in the Technical Insights section below.
Our Managed Security Program is mandatory for all Quartet clients. We deliver much better service, at better rates, by making coverage mandatory. The Essentials Package can be overlaid on your existing security initiatives and is adequate for many organizations. The Professional Package is aimed at companies with higher risk exposure and/or higher compliance obligations. Our Customized Package is aimed at organizations (usually with internal IT staff) who require better reporting and greater monitoring coverage.
Intrigued? The first step is scheduling a meeting. We will then assess your technical environment and prepare a 25 page report that ranks vulnerabilities on 18 different security aspects. We will build a security remediation budget with you and propose an implementation plan for our service. The report is free if you subscribe to our service. There is a nominal fee if you choose not to. A sample copy is available to download.
Managed Security Program
Managed Security Program – Service Details
Anti-Virus – The Anti-Virus Threat Intelligence Platform continuously collects, analyzes, and correlates data, ensuring complete protection. The lightweight client utilizes a <1MB client which installs, scans, and protects in seconds.
Anti-Malware – The multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection in a single platform.
Phishing Protection – The Phishing Protection Learns, Sees and Blocks phishing, malware and ransomware before it hits your users. It uses DNS to stop threats over all ports and protocols
Workstation Patching – Deploy security updates for Windows and software updates for commonly used third-party software.
Full Disk Encryption – Full Disk Encryption protects the confidentiality of data stored on your computer. Our solution ensures your computer files are encrypted and secure.
Monthly Internal/External Scan Report – Monthly reports that delivers security issues in your network firewall where malicious outsiders can break in and attack your network. This report also includes is a report that delivers an issue summary and a risk score.
Network Detector – The Detector sits inside your network, constantly scanning for suspicious anomalies, changes and threats. Detector is designed to deliver timely and relevant daily email alerts of any suspicious issues it discovers, as well as comprehensive weekly notices of all network anomalies, changes and threats that it finds.
Firewall with Security Services Package – This security package secures your network at the gateway against threats such as intrusions, viruses, spyware and other dangerous applications.
Two Factor Authentication – Two factor strengthens access security by requiring two methods to verify your identity. Something you know, plus something you have.
Fully Customized Reporting – Customized reports allow you to add other key elements that are not on the standard reports.
Documentation – Documentation for security procedures and practices.
Penetration Testing – E-Mail, Browsing and Phishing – Security testing at three different levels; E-Mail, Browsing and Phishing. Our tests will identify potential security risks.