We are currently partnering with Bitdefender and use their Cloud Security for MSPs to offer comprehensive endpoint security in an a-la-carte or bundled manor. The a-la-carte offering ensures that you get all the protections you want/need without having to pay for extras that serve no purpose in your business environment, where as the bundled offerings allow you to save by bundling the base protection with certain add-ons.
We provide protection for Windows, Mac, and Linux computer, as well as Android and Apple Phones.
Computer Protection Modules
Base Protection (BP) (Details)
Endpoint Security Base: Includes: Antimalware/Antivirus, Anti-Exploit, Firewall/IDS, Content/Web Controls, Device Control.
Antimalware/Antivirus: Protection layer is based on security content scanning and heuristic analysis (B-HAVE, ATC) against: viruses, worms, Trojans, spyware, adware, keyloggers, rootkits, ransomware, and other types of malicious software.
Firewall/IDS(Intrusion Detection System): The Firewall controls applications’ access to the network and to the Internet. Access is automatically allowed for a comprehensive database of known, legitimate applications. Furthermore, the firewall can protect the system against port scans, restrict Internet Connection Sharing (ICS) and warn when new nodes join a Wi-Fi connection. The IDS Focuses on detecting network attacks designed to gain access on endpoints through specific techniques, such as: brute-force attacks, network exploits, password stealers, drive-by-download infection vectors, bots, and Trojans.
Content Control: Helps enforce company policies for allowed traffic, web access, data protection and applications control. Administrators can define traffic scan options and exclusions, schedule web access while blocking or allowing certain web categories or URLs, configure data protection rules and define permissions for the use of specific applications.
Web Traffic Scan: Warns and prevent users from accessing potentially harmful websites and links, such as malware, phishing, botnets, and suspicious domains, or websites that violate your organization’s standards.
Device Control: Allows prevention of sensitive data leakage and malware infections via external devices attached to endpoints by applying blocking rules and exceptions via policy to a vast range of device types (such as USB flash drives, Bluetooth devices, CD/DVD players, storage devices, etc.).
Anti-Exploit: Catches the latest exploits in real-time and mitigates memory corruption vulnerabilities that can evade other security solutions. It protects the most commonly used applications, such as browsers, Microsoft Office or Adobe Reader, as well as others that you may think of. It watches over system processes and protects against security breaches and hijacking existing processes.
Add-ons (Details)
Advanced Threat Security (ATS): Provides early visibility into suspicious activities to protect against emerging threats by continuously monitoring running processes, and grades suspicious behaviors, such as attempts to: disguise the type of process, execute code in another process’s space (hijack process memory for privilege escalation), replicate, drop files, hide from process enumeration applications, etc. Each suspicious behavior raises the process rating. When a threshold is reached, an alarm is triggered.
Patch Monitoring (PM): Keeps operating systems and third party software applications up to date and provides a comprehensive view on the patch status for your managed Windows and Linux endpoints.
Endpoint Detection and Response (EDR) (Requires ATS): Uncover attacks early, with industry-leading actionable detection.
Integrity monitoring (IM): Monitoring the integrity of entities such as files, registries, directories, installed applications, and users for escalation of privilege.
Cloud Email Security: Protect emails from spam, phishing and malware as well as sophisticated and targeted attacks. Requires hosted email service such as Google Workspace, or Office365. Not usable with Gmail or other non hosted email accounts.
Full Disk Encryption: Protect data on laptops by implementing full disk encryption. This prevents access to data if laptop is lost or stolen.
Mobile Security
Advanced Malware Detection: Safeguards mobile devices from a broad variety of threats by offering comprehensive malware detection capabilities.
Phishing Protection: Analyses incoming messages and detects any malicious links or content that could be used to acquire sensitive data or credentials.
Network Security: Offers an extensive set of tools for protecting mobile devices against a variety of network-based hazards. It helps assure the security and integrity of mobile devices in the current threat landscape by monitoring network traffic, providing secure connectivity, and detecting and preventing attacks.
Mobile Threat Intelligence: Provides users the real-time security and analytics they need to protect their mobile devices from a variety of threats.
Web Content Filtering: Warns and prevent users from accessing potentially harmful websites and links, such as malware, phishing, botnets, and suspicious domains, or websites that violate your organization’s standards.
Price list
Bundles | Rate1 |
---|---|
Endpoint Security: Secure Endpoint Security Base, ATS, and EDR | $12.00 |
Endpoint Security: Secure+ Endpoint Security Base, ATS, EDR, PM | $17.35 |
Endpoint Security: Complete Endpoint Security Base, ATS, EDR, PM, IM | $22.25 |