Don’t guess your network’s security status… know
The IT threat landscape is ever changing and expanding
Threats such as ransomware and crypto attacks continue to affect organisations’ networks and digital assets, whilst even more lucrative cyber crimes, such as form jacking (which steals user data) and targeted attacks (which divert funds from supply chain transactions) increase at a vast rate.
Typically, infrastructure is becoming more diverse with most organisations employing a hybrid environment of on-premise and cloud infrastructure covering multiple operating systems and an extensive array of applications. This exposes more points of entry for cyber-attacks, which we refer to as the ‘Attack Surface Area’.
To address these threats, organisations require increased protection, improved detection and effective response if an attack does compromise one or more systems. Cyber-security provisions also need to keep pace with the ever-changing threat landscape.
Our suite of cyber security services protects your company’s digital assets, negating the need to fund your own specialist cyber security department.
The service includes advanced monitoring, deep analytics, machine learning and automated response.
We identify threats and issues that need to be remediated.
We either then work with your IT team to fix them or pass the actions to the NVT Group Service Desk for resolution.
Choose from three levels of protection
The Essentials package offers a basic level of protection against cyber-attacks, provides visibility of user access activity and highlights vulnerable systems you are operating…
Our Security Appliance provides a secure DNS server, blocking access to malicious websites and content. The blacklist is updated daily so your protection automatically stays up to date.
AUTHENTICATION LOGGING (Active Directory)
Our Security Appliance gathers all the relevant security logs from your domain controllers for analysis. We will also look for abnormal behaviour. If a privileged account is accessed at an unusual hour, we will raise an alert to let you know.
SERVER VULNERABILITY SCANNING
Our Security Appliance performs scheduled scans on your network and catalogues your vulnerabilities, provides details of the severity, offers relevant knowledge articles and tells you what you need to do to fix the exposure.
The Advanced package adds rigorous controls and insight to the perimeter of your network. It includes all the Essentials package features, plus the following…
We will supply, configure and install a robust security firewall which will actively protect your network from malicious cyber activity. If you are operating in Microsoft Azure, AWS or Google Cloud Platform, we will protect them with the same technology and policies.
INTRUSION DETECTION/PREVENTION SYSTEM
Traffic passing through the firewalls is continually checked against a database of known malicious signatures. The system can be configured to alert and/or block the traffic and the policy can be weighted towards allowing connectivity or higher security based on your chosen risk profile.
We use geographic rules to limit access to critical systems from only necessary countries/continents, as well as block access from malicious sources such as the dark web. This greatly reduces the surface area that attackers can use to compromise your systems.
The Concepta Security Services Complete package extends a high level of protection into your internal network. It includes all Essentials and Advanced features, plus the following…
NETWORK ACCESS CONTROL
When devices connect to your network, the Network Access Control (NAC) system checks that it is a known and authorised device before allowing it access to corporate resources. As an added benefit you can choose to enable segregated guest access for visitors.
ENDPOINT POSTURE ANALYSIS
Endpoint Posture Analysis ensures that all client devices are fit for connection by checking that security updates are applied and antivirus definitions are up to date. If a device doesn’t meet the criteria it is moved to a special quarantine area for remediation before being readmitted to the network.
FIREWALLING FOR INTERNAL SECURITY ZONES
Firewalls are used to create multiple security zones. If an internal resource is compromised by an attacker, this limits their ability to spread an attack between zones in the network.
An overview of the service
Managed Security Services
Simply select your preferred level of protection between ‘Essentials’, ‘Advanced’ and ‘Complete’ and we do the rest. Expertise in cyber security is not required.
All pricing is per user, per month, so costs increase only with the size of your organisation and decrease accordingly.
Prices are also fixed for the duration of your subscription.
All data is sent to the analytics and visualisation system. It analyses these complex data sets automatically, so you don’t have to.
This allows all security posture information to be observed in one place.
Reduce Attack Surface Area
We utilise a suite of different solutions to reduce the available avenues of attack. They work together by blocking users’ access to malicious content, preventing access from high-risk sources, uncovering security weakness and alerting to suspicious activity.
We deploy a Security Appliance to any site which contains IT infrastructure. It performs vulnerability scans and gathers security logs. The appliance is available as a physical machine or virtual image for all major hypervisors and containers.
We provide the same level of protection across your on-premise infrastructure and all major cloud infrastructures.
Other IT Services
Talk to us about these IT Services which can help your business operate more efficiently and securely.