Fortify
15953
page-template,page-template-full_width,page-template-full_width-php,page,page-id-15953,bridge-core-3.0.8,qi-blocks-1.3.3,qodef-gutenberg--no-touch,qode-page-transition-enabled,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-29.5,qode-theme-bridge,wpb-js-composer js-comp-ver-7.9,vc_responsive

Let us do the heavy lifting

One of the biggest challenges many SMBs face is finding technical security solutions (controls) and tools in a very congested market that…

 

  • are affordable to small and medium sized businesses
  • are effective
  • achieve compliance requirements
  • produce the information needed to make good decisions.

 

Security tools are often built for the enterprise, which pushes the minimum user / device count and price up. This can leave many solutions unobtainable to most SMBs.

 

This is why we have put together our Fortify service.

We understand you may have your own solutions which could need supplementing or uplifting. All of our solutions are available individually or as part of a cost-saving package.

 

In addition, all our solutions are thoroughly tried and tested for efficacy and to meet the requirements of clients, Cyber Insurance, and security certifications like Cyber Essentials and ISO 27001.

 

Our Fortify solutions take the heavy lifting away from your business – the tools add an important layer of security, and we manage them on your behalf. This frees up your team and enables them to make the best decisions on how to remedy vulnerabilities, based on crucial insights from us.

We spend a lot of time researching solutions and incorporating them into our Fortify collection - designed with small and medium sized businesses in mind. We partner with quality vendors and have negotiated on your behalf to provide the cover you need at a cost that isn't eye watering.

John Ricketts, Managing Director, InfoShelter

Our Baseline Fortify solutions

Security awareness training and phish testing

Our security awareness training solution, based on the Phishing Tackle platform, adds a vital security layer ensuring your first and best line of defense (your people) have all the knowledge and skills to identify potential security issues and spot phishing emails. This solution can be configured to match the specific needs of your business and we can enable options such as:

  • Carefully selected and engaging security awareness training modules sent straight to staff inboxes at a scheduled frequency of your choosing (monthly / quarterly etc.).
  • Automated simulated phishing campaigns, using the same emails as hackers, delivered to your staff at a frequency of your choosing.
  • A PhishHook Outlook plugin allowing your team to report suspicious emails with the click of a button.
  • Dark web assessment to see if your staff’s business email addresses have been involved in security breaches.
  • Synchronise users and provide single sign-on using the Microsoft Office 365 integration.
  • Full reporting on training and phish test campaigns defined for your company.

Next generation malware protection

Everyone has anti-virus software, right? True. But not all anti-virus tools offer the same level of protection. The ability to detect and manage malware varies greatly and some software can make it difficult to centrally manage your devices and any infections.

 

Our aim is to address and uplift deficits in malware detection as well as response. The InfoShelter Endpoint Detection and Response service is based on award winning SentinelOne, a Gartner Magic Quadrant Leader utilising next generation, AI driven detection capabilities. There are also tailored options to provide continuous round-the-clock monitoring of your systems by a team of specialists in a Security Operations Centre (SOC). This ensures that all potential security threats or incidents are detected and responded to promptly.

 

By using the InfoShelter SentinelOne service you can benefit from the following features:

  • AI driven, next generation malware detection capabilities which combine static and behavioural detections to neutralise known and unknown threats.
  • Options for 24 x 7 x 365 Security Operations Centre (SOC) team monitoring
  • Options for Managed Detection and Response (MDR) – automated remediation of infections by the SOC team.
  • Full control of your company’s use of USB removable storage, as well as Bluetooth devices – offering data leakage prevention solutions.

Vulnerability Assessment

A hacker with access to your system will look for vulnerabilities to exploit, to gain a stronger foothold into your system and do more damage.

 

Vulnerabilities are constantly found in software (operating systems AND applications like Adobe and Zoom). Software vendors provide patches to address these vulnerabilities, but how do you know that all patches are being applied? Vulnerabilities also exist in the way your services and operating systems are configured – often default settings for systems leave security gaps.

 

Vulnerability management is very important, both from security risk, and compliance requirement perspectives. You will often find clauses in client contracts requiring you to keep your systems patched as well as requirements in Cyber Essentials and ISO 27001. The InfoShelter vulnerability assessment service has the following features:

  • Scans for all operating systems to detect vulnerabilities caused by missing patches and misconfigurations in your systems.
  • A monthly report delivered securely to you with details of where all identified vulnerabilities exist in your environment.
  • We provide full access to your portal to your local or outsourced IT teams to assist with remediation.
  • For those without an IT team – we can offer additional options for remote patch management by the InfoShelter team (not included in the baseline solution).

Our Premium Fortify solutions

Round-the-clock security monitoring

Log files are important. Everything that happens in your computer system produces an event in a log.  A log file, or a combination of log files, can provide a complete picture of all activity on your systems, including nefarious activity. Logs can also be used as crucial evidence in cyber breach incidents. You can even read log files at night to help you fall asleep (however, we would recommend a book).

 

The activity of log monitoring is now also a requirement in many cyber insurance and client procurement activities. But how can SMBs find the time and resource to do this?

 

By using the InfoShelter SIEM (Security Information and Event Management) service, SMBs can outsource the heavy lifting of threat detection by using our qualified team of threat analysts to monitor your logs 24 x 7 x 365 in a Security Operations Centre (SOC).

 

InfoShelter are partnering with ConnectWise Perch Security to deliver this service at a price designed with SMBs in mind.

  • You will benefit from 24 x 7 x 365 threat monitoring on all systems we ingest logs from.
  • We can take logs from a wide variety of systems such as Microsoft Office 365, Amazon Web Services (AWS), MS Azure, Cisco Umbrella, SentinelOne, Microsoft Windows, MacOS, and Cisco Meraki to name a few.  
  • We provide full access to your portal for your local or outsourced IT teams, to assist with remediation.
  • We can tailor your solution to your needs and provide options in pricing around your requirements for log retention and response time.

Interested in any of our Fortify solutions?