Secure Your Investment With Security-as-a-Service

Blogs

We can’t all monitor our IT infrastructure 24/7 and react when a threat becomes reality. As cyber threats become more sophisticated and the stakes rise, a breach will, at minimum, cost time and money to rectify. At worst, a security incident could cause the complete failure of a business. Trust ACS to help protect your business.

Choose Security-as-a-Service
Our Core Managed Service Package provides simple cyber security tools, including a range of combined services that offer basic protection and training. However, with the evolving level of threats that businesses typically face, these services alone may not provide sufficient protection against sophisticated attacks.

At ACS we offer additional Security-as-a-Service packages that work in conjunction with our Managed IT Services. Depending on a business’ needs, our Security as a Service Standard (SECaaS Standard) and Security as a Service Plus (SECaaS Plus) packages can be added to our Managed IT Service agreements for greater protection and peace of mind.

CHOOSE YOUR SERVICE PACKAGE
Managed IT Service: Security Basics

– Endpoint Security
As standard, ACS Managed IT Services include provision and management of first-class anti-virus and anti-malware protection on all your devices. We provide Webroot Endpoint protection to ensure that your devices and data are protected wherever they are in the world.

– User Authentication & Data Permissions
Robust User Authentication ensures that only genuine and authorised users can access your systems. ACS will ensure that User Authentication settings are configured to best practices, utilising Multi-Factor Authentication features where available and providing guidance on suitable password policies where they are not. Our team will ensure that access and data permissions are set correctly to assure that only those users who are permitted to, can access the most confidential data.

– Device Management
ACS deploys sophisticated remote management agents to all our Managed Service customer’s devices which allows our experts to monitor the health, performance, and configuration (encompassing both hardware and software footprints) remotely. Crucially ACS will also ensure critical system updates are deployed in a timely manner.

– Firewall & Secure Remote Access
Our team will make sure that your Firewalls are kept up to date, are properly configured and that remote access is conducted using secure, encrypted methods such as via SSL VPN or similar.

– E-Mail Gateway Service
The ACS experts will guide you in selecting the correct E-Mail Gateway Service for your organisations needs and it will be configured so that it appropriately defends your users from phishing, spear-phishing, and whaling attacks as well as general spam.

Security-as-a-Service Standard (in addition to Managed IT Service Basics)

– User Awareness Training
At ACS we utilise and recommend the market-leading KnowBe4 Security Awareness Training and Simulated Phishing Platform to deliver effective and targeted cyber-security awareness training to your teams. Training is targeted based on the results of simulated phishing attacks and content is delivered via a combination of short videos and written briefings. Effectiveness and general awareness can then be reported on and scored.

– Multi-Factor Authentication
ACS delivers Microsoft Azure AD Premium to provide comprehensive Multi-Factor Authentication. This enables users to authenticate using authenticator apps, SMS Text messages, or even telephone calls and provides the peace of mind that moving away from comprisable password systems gives.

– Information Rights Management
Microsoft Azure Information Rights Management protects your data. It ensures that your data remains encrypted and is accessible only to those individuals you choose – both inside and outside of your organisation. Not only in the manner you select, but wherever they are, and from whatever device they use. Access controls effectively live with the data, and access can be audited and revoked remotely.

– Cyber Essentials
As an IASME Licensed Certification Body, ACS will assist your organisation in achieving the UK Government based Cyber Essentials accreditation, giving peace of mind for you, your customers, and suppliers that cyber-security is taken seriously by your organisation and appropriate controls are in place. Read more (https://www.acs365.co.uk/cyber-essentials-for-business/)

Security-as-a-Service Plus (In addition to SECaaS Standard)

– Cisco Umbrella
Cisco Umbrella provides cloud-based DNS-layer security and secure web gateway protecting your users and devices from web-based malware. Cisco Umbrella allows you to enforce acceptable use policies and block advanced threats.

– Advanced Multi-factor Authentication
Implementing Azure AD Premium’s advanced Conditional Access controls, provide extra sophisticated user authentication, monitoring, alerting, and reacting to potential threat; concerns such as impossible travel between log-in attempts or access from unusual locations.

– Advanced Information Rights Management
Azure Information Rights Management will check automatically for confidential content within documents. Information such as bank details, national insurance numbers of key words/phrases are searched and the appropriate restrictions and protections on documents are automatically imposed without user intervention.

– Cyber Essentials PLUS
As an IASME Licensed Certification Body, ACS will assist your organisation in achieving the UK Government based Cyber Essentials Plus accreditation, giving peace of mind for you, your customers, and suppliers that cyber-security is taken seriously by your organisation and appropriate controls are in place. Read more (https://www.acs365.co.uk/cyber-essentials-for-business/)

– Darktrace
Darktrace is the world’s leading Cyber AI. This intelligence software will monitor your IT systems for unpredictable threats and autonomously respond to emerging attacks in seconds. Darktrace learns the unique ‘DNA’ of your organisation and quickly responds to attacks that may otherwise go under-detected, including zero-day vulnerabilities and insider attacks.

– Cymulate
Cymulate tests the strength of your security by simulating real cyber-attacks across all attack vectors based on MITRE ATT&CK™, protecting your organisation from threats before they even show up. The Cymulate Risk Score and a clear report that details your up-to-the-moment security posture. Using proven methodologies to evaluate cyber risks such as NIST, CVSS V3, and Microsoft DREAD, Cymulate provides direct instructions to reduce your attack surface and makes it easy to prioritise which gaps to close first.

Speak to a Specialist at 01604 704000 or request a call back via info@acs365.co.uk