Cyber Security

Cyber Security for your business network

To provide a managed iboss service Cyber Security 4 Business will deploy a secure tunnel (IPSEC or GRE) from the business network back to our datacentre over which ALL inbound and outbound communication – TCP/IDP will be directed.

Once the Cyber Security 4 Business iboss platform is able to ‘see’ all the communications over a network it is able to perform:

  • Blended AV scanning – malware feeds from a variety of proprietary and best-of-breed sources.
  • Intrusion detection
  • Threat detection and isolation – identify and mitigate infected devices
  • Network anomaly detection – is this normal traffic, or something nasty?
  • Network behavioural Analysis – why is data being sent to China?
  • Web threat filtering including social media, and SSL traffic inspection.
  • Alerting and Reporting
  • Secure Against Threats
  • FULL Cyber Security Protection
Cyber Security Packages

The Cyber Security 4 Business team will constantly monitor the iboss Incident Response Centre that identifies data breaches and will alert the customer when required, leaving you to concentrate on running your business.

As part of the deployment Web Filtering is provisioned but management of the Groups – the policies applied to those groups and the report generated by Internet use is passed down to the individual business - this enable the business to:

  • Refine policies to meet the business need
  • Filter BYOD to further enhance security
  • Deny access to non-work sites
  • Comprehensive reporting
  • On demand SSL decryption of sites
  • Build a local list of allow or deny sites

Cyber Security 4 Business will continue to maintain the platform but Web Filtering is solely controlled by the company’s management/IT department.

Price - £50 PCM for up to 10 Users

Complimentary Services

Additional services for our packages

Mobile Device Management. Secures all users, on any devices or platforms, on or off premises. Offers easy-to-use centralized management across mixed-mobile deployments. Prevents unapproved apps with granular application management.
Consolidates detailed reporting and dashboards across all mobile users whether on or off the network.
Eliminates blind spots by scanning mobile SSL/HTTPS traffic even when devices are off-premises.
Mobile Security. A small client is deployed to all mobile devices that forces all Internet traffic to the Cyber Security 4 Business iboss platform which then applies the company’s Internet polices on the traffic. Ensuring company supplied devices are only used for business purposes and increasing security by reducing the risk of exposure to unsafe sites on mobile devices.
E-mail Filtering. Cyber Security 4 Business offers a solution that is easily installed, easily managed and highly secure for your email. Deployed in minutes with a Spam Catch Rate of more than 99,9 % and a False Positive Rate near to zero the service protects against potentially dangerous contents (Script, i-frames, etc) utilising Multi layered anti-spam engine and Public and Local RBL Checks. SMTP Rejects and Delivery Information reporting.
Encryption Services – Priced individually.
Full Disk Encryption – encrypts only disks and partitions you want, transparent pre-boot security using FIP 140-2 validated 256 bit AES Encryption. Encryption may be started and managed remotely, Remote user-password recovery, Enhanced workstation screening prior to encryption including Safe Start Mode.
Removable Media Encryption - No extra space is reserved for encrypted content and the whole device capacity can be used by the user, Policy driven includes DESlock Go, on-device software for use on unlicensed systems, works with any USN drive, DV and DVD media.
File and Folder encryption – Encrypt only files and folders you want; All files moved to encrypted folder are encrypted immediately
Email Encryption. - Transparent email encryption for Outlook through a dedicated plug-in, the email can only be decrypted only by the recipients who share the same key as the sender. Text and clipboard encryption works with any e-mail client including webmail.
Secure Communication. Prevent electronic communication theft, and unauthorized copying, viewing, printing and storage of messages and documents. Using view-on-demand architecture, only one copy of each message and copy-protected document exists on a secure server with double layer military-grade encryption. Users never take possession of the data, so there is nothing to find on a lost device or to hack on a compromised device.
Communication Governance. A powerful enterprise content management tool for supervisory and regulatory compliance, communications risk management, e-discovery and automation of document retention policies. All of an organization’s electronic communications are managed using the strongest security available, high-speed access, comprehensive intelligent search functionality, a robust governance model, and tamper-proof regulatory compliance.
Call now on 0333 344 6501 and get a free consultation or contact us via the website »

What our clients say