Endpoint Security

Where is the weakest link in your infrastructure? If we ignore the human factor, it could easily be the endpoints (laptops, mobile devices, etc). They typically tend to run a multitude of applications and services, which in nature opens up the device for a high number of vulnerabilities than a closed down server.

Protection of endpoints have developed a lot the past years, and the security solutions should now fight off malware, protect confidential information on the hard drive and much more.

With our Endpoint Security services, you can implement market leading endpoint protection with the latest technology within malware protection. And the service scales to support full disc encryption, removable media encryption and application control.

We offer the following deliverables within this service:

  • Hotline Support: day to day troubleshooting, support and incident response
  • Professional Services: building a new design supporting endpoint protection in a global infrastructure
  • Managed Services: a fully managed Anti Malware service with everything included
  • Solutions: best of breed products integrated to fit your demands

Services

Hotline

When things get complicated, we will support you and provide direct access to the vendor support.

Hotline is available via email, phone and the customer portal.Response time is defined by the SLA you attach to the agreement:

  • 8 x 5 x 4
  • 24 x 7 x 4

Professional

Analysis & Design
We have years of experience reviwing existing infrastructures, and providing optimized network designs. Take advantage of our professional services team that will support you doing your classic architectural tasks such as:

  • Architecture Refresh
  • Rogue Agent Detection
  • Integrations with sandbox, SIEM and other technologies

 
Implement & Configure
If you buy the solution, we can do more than a simple Rack & Stack. We will support throughout the deployment and deliver a detailed set of system documentation.

Deployments are always performed by combining best practices from the vendor with our own experiences.

Typically we can estimate deployments beforehand and are delivered using fixed pricing. We have the following deployment options available

  • Small: 15 hours
  • Medium: 50 hours
  • Large: 100 hours
     

Review & Assess
Optimizing the current configuration and rulebase. We offer the following:

  • Trend Micro OfficeScan Review
  • Endpoint Security Assessment (Offensive – Penetration Testing)

Managed

We deliver managed services either on-premises or delivered as a cloud service.

On-Prem Trend Micro OfficeScan
To help protect your online transactions by managing your secure web gateway devices. We help manage your total cost of ownership by providing around-the-clock device monitoring and management and access to experienced, certified analysts to help you maximize the value from your security technology investments.

Key Benefits:

  • Around-the-clock monitoring
  • Operational Efficiency
  • Decreased security and compliance threats
     

Key Features:

  • Automatic Updates and Upgrades
  • Performance Data Reporting
  • Yearly Configuration Healtch Check
     
    Secu Anti Virus (ANT)
    No hardware or software changes required, simply deploy our MSI package and obtain instant protection with zero configuration.

 

Technical Capabilities:

  • High-fidelity machine learning (pre-execution and runtime)
  • Behavioral analysis (against scripts, injection, ransomware, memory and browser attacks)
  • File reputation
  • Variant protection
  • Census check
  • Web reputation
  • Exploit prevention (host firewall, exploit protection)
  • Command and control (C&C) blocking
  • Data loss prevention (DLP module)
  • Device control
  • Good file check

 
Service Capabilities:

  • Monthly Reporting
  • Email Alerts
  • Customer Portal access

Technologies

Trend Micro

Trend Micro Officescan is the endpoint security solution, covering both workstation and server platforms. It will provide the following benefits:

  • Security Risk Protection, by combining many technologies such as machine-learning
  • Damage Cleanup Services cleans computers of file-based and network malware
  • Web Reputation proactively protects agent computers within or outside the corporate network from malicious and dangerous websites
  • OfficeScan firewall protects agentes and servers on the network using stateful inspection
  • Data Loss Prevention safeguards an organization’s digital assets
  • Device Control regulates access to external storage devices
  • Behavior monitoring monitors agents for unusual modifications to the operating system or installed software
     

It can be easily expanded with these add-ons:

  • Trend Micro Endpoint Encryption for full disc and removable media encryption
  • Trend Micro Endpoint Application Control for achieving application whitelisting

SentinelOne

SentinelOne is the only platform that defends every endpoint against every type of attack, at every stage in the threat lifecycle. Cloud based with low TCO, restore your endpoint within seconds if infected by ransomware.
 
SentinelOne Deep Visibility extends the SentinelOne Endpoint Protection Platform (EPP) to provide full visibility into endpoint data. It’s patented kernel-based monitoring allows a near real-time search across endpoints for all indicators of compromise (IOC) to empower security teams to augment real-time threat detection capabilities with a powerful tool that enables threat hunting.
 
SentinelOne: Ransomware Protection – Guaranteed.
SentinelOne believes that your next-generation endpoint protection solution should give you complete confidence that your sensitive data is protected against ransomware and other sophisticated attacks.


Watch a demo showing Fortinet integration with SentinelOne and how to share threat information here.

Gain more knowledge about SentinelOne in their datasheets here.