SERVICES | |||||
---|---|---|---|---|---|
CLIENTELE | |||||
Home/Personal - 1-20 computers | ![]() | ![]() | |||
Small Business - 1-100 computers | ![]() | ||||
Enterprise - 100+ Computers | ![]() | ||||
Celebrity - Athletes, Entertainers and Politicians | ![]() |
||||
PLATFORMS | |||||
Pcs, laptops, Windows servers | ![]() | ![]() | ![]() | ![]() | ![]() |
Mac clients (iMacs and MacBooks) and servers | ![]() | ![]() | ![]() | ![]() | ![]() |
Mobile devices - Android and iOS | ![]() | ![]() | ![]() | ![]() | ![]() |
Office 365 and G Suite | ![]() | ![]() | ![]() | ![]() | ![]() |
SharePoint, OneDrive, Dropbox, Google Drive | ![]() | ![]() | ![]() | ![]() | ![]() |
ANTI-VIRUS AND WEB SECURITY | |||||
Ransomware protection | ![]() | ![]() | ![]() | ![]() | ![]() |
Defends against viruses, spyware and other malware | ![]() | ![]() | ![]() | ![]() | ![]() |
Advanced URL filtering blocks inappropriate websites | ![]() | ![]() | ![]() | ![]() | ![]() |
Web threat protection stops viruses and threats before they reach your home or business | ![]() | ![]() | ![]() | ![]() | ![]() |
Mobile device security | ![]() | ![]() | ![]() | ![]() | ![]() |
DATA PROTECTION | |||||
USB device control | ![]() | ![]() | ![]() | ![]() | ![]() |
Firewall | ![]() | ![]() | ![]() | ![]() | ![]() |
Data loss prevention (DLP) | ![]() | ![]() | ![]() | ![]() | ![]() |
Stolen computer data retrieval | ![]() | ![]() | ![]() | ![]() | ![]() |
DEEP/DARK WEB MONITORING | |||||
![]() | ![]() | ![]() | ![]() | ![]() |
|
Password | ![]() | ![]() | ![]() | ![]() | ![]() |
Social media user names | ![]() | ![]() | ![]() | ![]() | ![]() |
MESSAGING SECURITY AND ANTISPAM | |||||
Stops spam and email-based viruses | ![]() | ||||
Native Microsoft Exchange Server threat protection | ![]() | ||||
Data loss prevention (DLP) | ![]() | ||||
Advance Threat Protection and DLP for Office 365 and G Suite | ![]() | ||||
NETWORK VULNERABILITY TESTING | |||||
Daily network vulnerability scanning | ![]() | ||||
Weekly network vulnerability scanning | ![]() |
||||
Monthly network vulnerability scanning | ![]() | ||||
Quarterly network vulnerability scanning | ![]() | ![]() | |||
WEBSITE VULNERABILITY TESTING | |||||
Weekly website vulnerability scanning | ![]() | ||||
Monthly website vulnerability scanning | ![]() | ![]() |
|||
BACKGROUND/EMPLOYMENT /INVESTIGATION CHECK | |||||
2 Personal background checks (husband or wife) | ![]() | ![]() | |||
3 Employee background check | ![]() | ||||
5 Employee background check | ![]() | ||||
8 Background checks on any employee, staff member, potential business associations | ![]() |
||||
BROWSER SECURITY | |||||
VPN safe browsing | ![]() | ![]() | ![]() | ![]() | ![]() |
Password Manager | ![]() | ![]() | ![]() | ![]() | ![]() |
CYBER CRIME INVESTIGATIONS | |||||
Cyber Bullying | ![]() | ![]() | |||
Cyber Blackmail/Extortion | ![]() | ![]() | ![]() |
||
Cyber attacks | ![]() | ![]() | ![]() |
||