SERVICES | |||||
|---|---|---|---|---|---|
| CLIENTELE | |||||
| Home/Personal - 1-20 computers | |||||
| Small Business - 1-100 computers | |||||
| Enterprise - 100+ Computers | |||||
| Celebrity - Athletes, Entertainers and Politicians | |||||
| PLATFORMS | |||||
| Pcs, laptops, Windows servers | |||||
| Mac clients (iMacs and MacBooks) and servers | |||||
| Mobile devices - Android and iOS | |||||
| Office 365 and G Suite | |||||
| SharePoint, OneDrive, Dropbox, Google Drive | |||||
| ANTI-VIRUS AND WEB SECURITY | |||||
| Ransomware protection | |||||
| Defends against viruses, spyware and other malware | |||||
| Advanced URL filtering blocks inappropriate websites | |||||
| Web threat protection stops viruses and threats before they reach your home or business | |||||
| Mobile device security | |||||
| DATA PROTECTION | |||||
| USB device control | |||||
| Firewall | |||||
| Data loss prevention (DLP) | |||||
| Stolen computer data retrieval | |||||
| DEEP/DARK WEB MONITORING | |||||
| Password | |||||
| Social media user names | |||||
| MESSAGING SECURITY AND ANTISPAM | |||||
| Stops spam and email-based viruses | |||||
| Native Microsoft Exchange Server threat protection | |||||
| Data loss prevention (DLP) | |||||
| Advance Threat Protection and DLP for Office 365 and G Suite | |||||
| NETWORK VULNERABILITY TESTING | |||||
| Daily network vulnerability scanning | |||||
| Weekly network vulnerability scanning | |||||
| Monthly network vulnerability scanning | |||||
| Quarterly network vulnerability scanning | |||||
| WEBSITE VULNERABILITY TESTING | |||||
| Weekly website vulnerability scanning | |||||
| Monthly website vulnerability scanning | |||||
| BACKGROUND/EMPLOYMENT /INVESTIGATION CHECK | |||||
| 2 Personal background checks (husband or wife) | |||||
| 3 Employee background check | |||||
| 5 Employee background check | |||||
| 8 Background checks on any employee, staff member, potential business associations | |||||
| BROWSER SECURITY | |||||
| VPN safe browsing | |||||
| Password Manager | |||||
| CYBER CRIME INVESTIGATIONS | |||||
| Cyber Bullying | |||||
| Cyber Blackmail/Extortion | |||||
| Cyber attacks | |||||