Managed Security Services = 360° Protection – Brad
I’m Already a Managed IT Services Client. Aren’t I Protected?
As a Managed IT Services client, you are already receiving a wide range of services that keep your network running efficiently and protect you from basic threats. For example, your agreement includes a selection of security solutions, such as 24/7 monitoring, proactive maintenance, patch management, and managed anti-virus software protection.
The problem is that cybercrime is on the rise, hackers are getting more creative and aggressive, and unfortunately, your employees are your greatest vulnerability due to human nature. An advanced and comprehensive security suite is needed to provide 360° coverage of your network, data, and all connected devices and peripherals.
What Does the Managed Security Services Package Include?
{Frank my gut is that we need to provide a little ‘meat’ in this section that describes SOC/SIEM and makes clients feel there is something significant they need to learn more about. And/or you can cherry pick a couple of the services you think the general population will relate and react to}
ACT’s advanced security suite takes security to the next level, leveraging a SOC/SIEM {or SIEM/SOC?} solution designed to manage risk through ongoing monitoring and detection, mitigate threats by implementing prevention measures, and maintain compliance.
Security Information and Event Management (SIEM) tools analyze and filter data to tell you who did what, when, and from where. Here are some examples of what our SIEM tools do:
- Aggregate large volumes of data from network devices, servers, domain controllers, and more
- Monitor events in a real-time environment
- Analyze data to detect patterns and suspicious activity
- Detect if someone is trying to break in, before they gain access to your data
- Automatically shut down access to vulnerable areas in the event of a breach or attempted breach
- Alert security specialists at the Security Operations Center (SOC)
ACT’s Security Operations Center (SOC) is staffed by trained security specialists and security engineers. If the SIEM tools detect an abnormality, the SOC team is immediately notified so they can begin remediation and defend against the threat. They also regularly review the data supplied by the SIEM tools, provide recommendations for improvement, and implement all necessary changes.
And we don’t stop there. ACT offers nearly two dozen solutions that help you proactively defend your network.
The chart below lists the available security services you may wish to discuss with your Account Manager. (new chart needs to be added by Brad and sized properly)
Click to enlarge Security Bundle Comparison Chart.
How Widespread Are Security Breaches Among Small and Medium-Sized Businesses?
71% of breaches are financially motivated, and hackers greatly profit when they sell your company’s data on the Dark Web. You likely store credit card numbers, bank account numbers, identifying information about your customers, patents, and more on your network. They are all of great value to a cybercriminal.
Here are a few recent statistics you should be aware of:
- Data breaches exposed 4.1 billion records in the first half of 2019 (and the numbers are rising).
- 94% of malware was delivered by email in 2019.
- One of the top malicious email attachment types is .doc, the extension used by Microsoft Word. Most employees say they would not hesitate to open these files.
- 60% of breaches involved vulnerabilities for which a patch was available but not applied.
- Attacks on IoT devices (any device connected to the internet) tripled in the first half of 2019.
- 61% of organizations have experienced a security incident in the past five years.
What Does it Cost?
Your Account Manager can help you determine which services are most appropriate and beneficial to your business. Should you desire ongoing Managed Security Services, it can seamlessly be added to your coverage.
Please contact your Account Manager or call 973-758-0500 to discuss this further.
Frank I’ve asked Brad to update the Call to Action in the banner below.