Security Services - Quartet Service

Security Services

Let's Talk


On August 12, 2019, the Canadian federal government released the voluntary cybersecurity certification program, CyberSecure Canada. Its purpose is to help small and medium sized businesses achieve a baseline of cybersecurity. Businesses who pass the audit and are compliant with the program will be granted a two-year certification.
View the pdf for more information on CyberSecure Canada’s baseline controls.


Security Services


All our clients are enrolled in the Managed Security Program. This service comes in two levels, Essentials and Professional. The Essentials package can be overlaid on your existing security initiatives and is the right choice for most organizations with normal risk exposure. The Professional package is designed for companies with higher risk exposure or higher compliance obligations. If your needs require customization beyond these two service levels, talk to us and we’ll prepare a security package suited to your needs as part of our Customized Security Program.

Our Managed Security Program has four pillars:

Internal Protection

Tricking one of your employees into clicking a phishing email is easier than attacking your servers directly. We'll help you spoof-proof your employees.


You'll know exactly where you stand. We turn mountains of monitoring data into meaningful, actionable insights that make your business more secure.

External Protection

What used to be mostly firewall maintenance has evolved to include pre-emptive initiatives to stop attacks before they reach you.

Vulnerability Testing

We find vulnerabilities before the bad guys do.

What You Can Expect

We purchase enterprise grade tools, deploy them on a multi-tenant basis and manage them 24/7/365. You get all the benefits at a fraction of the cost. Tools and reports are configured to your needs. Monitoring, remote service, and technician dispatch tools let us respond faster than ever. Monthly reports, documentation and vulnerability testing ensure compliance. Your risks are reduced, compliance obligations are met and costs are contained.

First Steps

The first step is to schedule a meeting. Then we’ll assess your technical environment and prepare a 25 page report that ranks vulnerabilities on 18 different security aspects. We’ll build a security remediation budget with you and propose an implementation plan for our service.

Managed Security Program

Feauture Essentials Professional Custom
Anti-virus, Anti-Malware, Phishing Protection & Workstation Patching
Full Disk Encryption
Monthly Internal/External Scan Report
Network Detector
Two Factor Authentication
Fully Customized Reporting & Documentation
Penetration Testing

Technical Insights


The Anti-Virus Threat Intelligence platform continuously collects, analyzes, and correlates data, ensuring complete protection. The lightweight (less than 1MB) client installs, scans, and protects in seconds.

Phishing Protection

Phishing Protection learns, sees and blocks phishing, malware and ransomware before it hits your users. It uses DNS to stop threats over all ports and protocols.


The multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection in a single platform.


Secures your network against threats such as intrusions, viruses, spyware and other dangerous applications.

Full Disk Encryption

Full Disk Encryption protects the confidentiality of data stored on your computer. Our solution ensures your computer files are encrypted and secure.

Penetration Testing

Security testing at three different levels; E-Mail, Browsing and Phishing. Our tests will identify potential security risks.

Fully Customized Reporting

Customized reports allow you to add other key elements that aren't in standard reports.

Workstation Patching

Security updates for Windows and software updates for commonly used third-party software.

Two Factor Authentication

Two Factor authentication strengthens access security by requiring two methods to verify your identity. Something you know (e.g. your password), plus something you have (e.g. access to a code sent to your cell phone).


Documentation for security procedures and practices.

Monthly Internal/External Scan Report

Monthly reports that show your potential vulnerabilities, issue summary, and risk score.

Network Detector

The Detector sits inside your network, constantly scanning for suspicious anomalies, changes and threats. The Detector is designed to deliver timely and relevant daily email alerts of any suspicious issues it discovers, as well as comprehensive weekly notices of all network anomalies, changes and threats that it finds.