SecurityGLOVE

 

glove

SecurityGLOVE offers an additional layer of security that wraps around your current security products & services. It is delivered and managed as an integral but independent solution.

Adding extra layers of security is always a best practice. Take this to the next level – have these layers managed independently as an added level of protection. SecurityGLOVE is a bespoke solution that enables you to select the products and technologies that add security features desired.

SecurityGLOVE works hand in glove with your security solutions and staff, adding layers of security that are managed independently from your security and IT staff. While independent in its features, deployment and management, SecurityGLOVE is designed to be operational and effective in a minimum amount of time.

The Benefits

SecurityGLOVE adds layers of security that add no operational overhead to your IT and security staff. Either as an external deterrent or as an internal checkpoint or management layer, this additional protection adds exponential improvements to security defensive and offensive designs.

SecurityGLOVE utilizes the following best-in-class layered defense technologies:

Blackberry Protect (formerly known as Cylance)

Typical Anti-virus technologies use a signature-based model, which is reliant on capturing new viruses in the wild and creating a master list of malware for users to download. This makes it especially vulnerable to zero-day attacks and modern threats which can alter themselves too quickly for signature updates to catch.

BlackBerry Protect, with its advanced Artificial Intelligence (AI), is able to provide you protection from new viruses.

  • Advanced AI training - It uses cloud-based supercomputers and millions of examples of malicious programs to train a neural net, a kind of digital brain, to recognize threats and stop zero-day threats.
  • Download and Protect - When you purchase BlackBerry Protect, you download a super lightweight ‘brain’ onto your computer, trained to catch and quarantine viruses.
  • Detection in milliseconds - BlackBerry Protect sits in the background, instantly recognizing threats the moment they occur and reacting in milliseconds - unlike other anti-virus software which must constantly scan for threats.
  • Complete protection - AI quarantines files it identifies as threats, allowing you to review individual threats on a given computer; stopping Ransomware in its tracks.
  • Eliminate Signatures – No interruptions for signature updates or slow scans.


Cisco Umbrella

Cisco Umbrella is a cloud-delivered service that provides the most secure, reliable, and fastest internet experience to more than 20 thousand customers daily. As more organizations embrace direct internet access, Umbrella makes it easy to extend protection to roaming users and branch offices. Its features include:

  • DNS-layer security - DNS-layer security provides the fastest, easiest way to improve your security
  • Cloud access security broker - Umbrella exposes shadow IT by providing the ability to detect and report on cloud applications in use across your organization.
  • Interactive threat intelligence – Umbrella’s unique view of the internet gives unprecedented insight into malicious domains, IPs, and URLs.
  • Integration with SDWAN - The Umbrella and Cisco SD‑WAN integration deploys easily across your network for powerful cloud security and protection against internet threats.

From small businesses without dedicated security professionals to multinational enterprises with complex environments, Umbrella is designed to provide the feature-functionality needed for any business.

Services Features

Agentless
No agents, probes, daemons, etc. are required. We manage all devices natively via the admin console

Endpoint discovery (apps, plug-ins, etc)
Regular scans to detect new devices, applications, plug-ins, etc. on endpoint devices

Security architecture review
A scheduled review of your endpoint security architecture

Device configuration
Regular reviews of device configurations conducted under your change management protocols

Signature & behavior analysis
Regular reports, reviews & analysis

Policy review
Joint planned security policy review

Policy testing
Define, plan, and execute testing of policies

Status testing
Planned & unplanned testing of endpoint devices for functionality, status & reporting

Policy upgrades
Create, maintain, and upgrade policies for supported endpoints

Incident fire drill
Assistance in general or specific security fire drills planned to test endpoint security products, processes and threats.

Log management
Scheduled device log

Administration
Day-to-day administration of endpoints based on scheduled or unscheduled tasks

Compatibility review
Planned and unplanned reviews of compatibility between endpoint devices and security devices products

Service incident management
Review and respond to automated or manual incident reports

Performance review
Planned reviews of the service delivery, device reports, incidents, escalations & effectiveness

Features review
A review and report of the use of features of the endpoint security products and the benefits they add. This includes available upgrades or enhancements

Change management
Completion and documentation of planned changes to configurations, connections, locations, policies and processes of the endpoint solution

Best practices
Creation, documentation & adoption of best practices relating to endpoint management

Status reports

Creation, distribution & review of scheduled status reports on agreed KPI’s, dashboards or outages.

CONTACT US TODAY TO REQUEST MORE INFORMATION ON ANY OF OUR SERVICES. Contact us