SERVICES | |||||
---|---|---|---|---|---|
CLIENTELE | |||||
Home/Personal - 1-20 computers | |||||
Small Business - 1-100 computers | |||||
Enterprise - 100+ Computers | |||||
Celebrity - Athletes, Entertainers and Politicians | |||||
PLATFORMS | |||||
Pcs, laptops, Windows servers | |||||
Mac clients (iMacs and MacBooks) and servers | |||||
Mobile devices - Android and iOS | |||||
Office 365 and G Suite | |||||
SharePoint, OneDrive, Dropbox, Google Drive | |||||
ANTI-VIRUS AND WEB SECURITY | |||||
Ransomware protection | |||||
Defends against viruses, spyware and other malware | |||||
Advanced URL filtering blocks inappropriate websites | |||||
Web threat protection stops viruses and threats before they reach your home or business | |||||
Mobile device security | |||||
DATA PROTECTION | |||||
USB device control | |||||
Firewall | |||||
Data loss prevention (DLP) | |||||
Stolen computer data retrieval | |||||
DEEP/DARK WEB MONITORING | |||||
Password | |||||
Social media user names | |||||
MESSAGING SECURITY AND ANTISPAM | |||||
Stops spam and email-based viruses | |||||
Native Microsoft Exchange Server threat protection | |||||
Data loss prevention (DLP) | |||||
Advance Threat Protection and DLP for Office 365 and G Suite | |||||
NETWORK VULNERABILITY TESTING | |||||
Daily network vulnerability scanning | |||||
Weekly network vulnerability scanning | |||||
Monthly network vulnerability scanning | |||||
Quarterly network vulnerability scanning | |||||
WEBSITE VULNERABILITY TESTING | |||||
Weekly website vulnerability scanning | |||||
Monthly website vulnerability scanning | |||||
BACKGROUND/EMPLOYMENT /INVESTIGATION CHECK | |||||
2 Personal background checks (husband or wife) | |||||
3 Employee background check | |||||
5 Employee background check | |||||
8 Background checks on any employee, staff member, potential business associations | |||||
BROWSER SECURITY | |||||
VPN safe browsing | |||||
Password Manager | |||||
CYBER CRIME INVESTIGATIONS | |||||
Cyber Bullying | |||||
Cyber Blackmail/Extortion | |||||
Cyber attacks | |||||