fbpx

String Layered Cyber Security

JUST FOUR LITTLE WORDS ... "we have been hacked!"

we have been hacked” – the start of a wholly unwanted, and unexpected, adventure.  If the cause of your problems are a cyber attack then you can probably look forward to:

  • downtime of your critical services
  • direct & indirect financial loss
  • reputational damage
  • worrying about what else might be compromised

It doesn’t have to be that way.  Our Security & Continuity portfolio recognises that no single product can provide faultless protection for your IT environment. Instead, our Security & Continuity portfolio, combined with complementary String 365 Services to address the ‘human element’, takes a layered approach to protection, ensuring that we address five key areas of vulnerability:

Advanced Perimeter Protection with SonicWall’s Next Generation Firewalls provides protection from branch office to data centre

Advanced Endpoint Protection with SonicWall Capture Client for end points and workloads of all types and sizes

String Phishing Protection provides testing and awareness training for organisations of any size

Realtime Dark Web Scanning for compromised credentials on a per domain pricing model

Cloud-augmented Business Continuity Solutions from 2 to 100 TB

Advanced Perimeter Protection

SonicWall’s Next Generation Firewalls are designed to meet today’s generation of cyber threats.

With Zero-Touch Deployment and simplified centralized management, installation and operation is easy.  Detect sophisticated threats, including encrypted attacks, with advanced networking and security features, like the multi-engine Capture Advanced Threat Protection (ATP) cloud-based sandbox service with Real-Time Deep Memory Inspection (RTDMI).

With optional features like PoE/PoE+ support and 802.11ac Wi-Fi, create a unified security solution for wired and wireless networks.

Our SonicWall firewall solutions are part of our end-to-end protection portfolio, integrating end point protection, wireless security and cloud app security through a single pane of glass.

Advanced Endpoint Protection

SonicWall’s Capture Client overcomes the limitations of traditional signature-based anti-virus solutions by using Artificial Intelligence to deliver zero-day, behavioural protection for your end points.

The ever-growing threat of ransomware and other malicious malware-based attacks has proven that client protection solutions cannot be measured based only on endpoint compliance. Traditional antivirus technology uses a long embattled signature-based approach, which has failed to match the pace of emerging malware and evasion techniques.

SonicWall Capture Client is a unified endpoint offering with multiple protection capabilities. With a next-generation malware protection engine powered by SentinelOne, Capture Client applies advanced threat protection techniques, such as machine learning, network sandbox integration, and system rollback.  Capture Client also leverages the deep inspection of encrypted TLS traffic (DPISSL) on SonicWall firewalls by installing and managing trusted TLS certificates.

String Phishing Protection

As today’s endpoint protection technologies get ever smarter; even with the best security software installed, it’s more often than not the end-user that presents the greatest vulnerability.  Phishing attacks target basic human vulnerabilities, by inviting them to carry out perfectly ordinary actions (e.g. clicking a link on a familiar seeming email, or sending sensitive details to a seemingly trusted source); these attacks can bypass whatever cyber security measures you might have in place.  So how can we help?  It’s quite simple:  education, education, education.

Our Phishing Protection Service comprises two key components:

  • A simulated (and safe!) Phishing attack, launched by our consultants, identifies any of your team members who are inclined to click on seemingly innocuous links.
  • We then deliver what we refer to as an online ‘Speed Awareness Course’ to any team members caught by our simulated attack.

We’ve also found that the most effective long-term solution is to repeat this exercise once a quarter; allowing your team to build awareness of the threat landscape over time.

Dark Web Scanning

The Dark Web is a hidden universe contained within the “Deep Web”- a sublayer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web.

The Dark Web is estimated to be 550 times larger than the surface Web, and growing.  Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

Our Dark Web Scanning Service is designed to help both public and private sector organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other blackmarket sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).

Business Continuity Solutions

Whilst our layered protection model is designed to provide high levels of protection, there will always be a chance that a threat can get through.  Our cloud-based business continuity solution is designed to minimise the business impact of a cyber attack:

  • Point in time copies of your data are held in multiple secure locations (local and cloud) to provide complete protection from cyber threats
  • As servers are backed up in their entirety, the recovery process can provide a complete system recovery in under an hour
  • Regular incremental backups ensure that servers & data can be recovered to within minutes of an incident
  • Verified daily backups, and regular, full, business continuity testing provide business continuity assurance
  • In addition to full server protection; individual files can be restored in seconds by your own team members