SERVICES |
|||||
---|---|---|---|---|---|
CLIENTELE | |||||
Home/Personal – 1-20 computers | ![]() |
![]() |
|||
Small Business – 1-100 computers | ![]() |
||||
Enterprise – 100+ Computers | ![]() |
||||
Celebrity – Athletes, Entertainers and Politicians | ![]() |
||||
PLATFORMS | |||||
Pcs, laptops, Windows servers | ![]() |
![]() |
![]() |
![]() |
![]() |
Mac clients (iMacs and MacBooks) and servers | ![]() |
![]() |
![]() |
![]() |
![]() |
Mobile devices – Android and iOS | ![]() |
![]() |
![]() |
![]() |
![]() |
Office 365 and G Suite | ![]() |
![]() |
![]() |
![]() |
![]() |
SharePoint, OneDrive, Dropbox, Google Drive | ![]() |
![]() |
![]() |
![]() |
![]() |
ANTI-VIRUS AND WEB SECURITY | |||||
Ransomware protection | ![]() |
![]() |
![]() |
![]() |
![]() |
Defends against viruses, spyware and other malware | ![]() |
![]() |
![]() |
![]() |
![]() |
Advanced URL filtering blocks inappropriate websites | ![]() |
![]() |
![]() |
![]() |
![]() |
Web threat protection stops viruses and threats before they reach your home or business | ![]() |
![]() |
![]() |
![]() |
![]() |
Mobile device security | ![]() |
![]() |
![]() |
![]() |
![]() |
DATA PROTECTION | |||||
USB device control | ![]() |
![]() |
![]() |
![]() |
![]() |
Firewall | ![]() |
![]() |
![]() |
![]() |
![]() |
Data loss prevention (DLP) | ![]() |
![]() |
![]() |
![]() |
![]() |
Stolen computer data retrieval | ![]() |
![]() |
![]() |
![]() |
![]() |
DEEP/DARK WEB MONITORING | |||||
![]() |
![]() |
![]() |
![]() |
![]() |
|
Password | ![]() |
![]() |
![]() |
![]() |
![]() |
Social media user names | ![]() |
![]() |
![]() |
![]() |
![]() |
MESSAGING SECURITY AND ANTISPAM | |||||
Stops spam and email-based viruses | ![]() |
||||
Native Microsoft Exchange Server threat protection | ![]() |
||||
Data loss prevention (DLP) | ![]() |
||||
Advance Threat Protection and DLP for Office 365 and G Suite | ![]() |
||||
NETWORK VULNERABILITY TESTING | |||||
Daily network vulnerability scanning | ![]() |
||||
Weekly network vulnerability scanning | ![]() |
||||
Monthly network vulnerability scanning | ![]() |
||||
Quarterly network vulnerability scanning | ![]() |
![]() |
|||
WEBSITE VULNERABILITY TESTING | |||||
Weekly website vulnerability scanning | ![]() |
||||
Monthly website vulnerability scanning | ![]() |
![]() |
|||
BACKGROUND/EMPLOYMENT /INVESTIGATION CHECK | |||||
2 Personal background checks (husband or wife) | ![]() |
![]() |
|||
3 Employee background check | ![]() |
||||
5 Employee background check | ![]() |
||||
8 Background checks on any employee, staff member, potential business associations | ![]() |
||||
BROWSER SECURITY | |||||
VPN safe browsing | ![]() |
![]() |
![]() |
![]() |
![]() |
Password Manager | ![]() |
![]() |
![]() |
![]() |
![]() |
CYBER CRIME INVESTIGATIONS | |||||
Cyber Bullying | ![]() |
![]() |
|||
Cyber Blackmail/Extortion | ![]() |
![]() |
![]() |
||
Cyber attacks | ![]() |
![]() |
![]() |
||
VPN Safe Browsing – A VPN, or virtual private network, is a secure tunnel between your device and the internet. VPNs protect you from snooping, interference, and censorship.  As you connect to a secure VPN server, your internet traffic goes through an encrypted tunnel that nobody can see into—including hackers, governments, and your internet service provider.
Vulnerability Scanning – Vulnerability scanning is the process of discovering, analyzing, and reporting security flaws and vulnerabilities.
Network Vulnerability Testing –Â Network vulnerability test/scanning is the process of inspecting and reporting potential vulnerabilities and security loopholes on a computer, network, web application or other device, including switches, routers, firewalls and wireless access points.
Data Loss Prevention (DLP) – Data loss prevention (DLP) refers to the strategies, processes, and technologies cybersecurity teams use to protect sensitive data from theft, loss, and misuse.