All you need to protect Windows desktops and file servers, Mac OS devices, iOS and Android mobiles and even Microsoft Office 365.
Alert security failure and rectification in real-time hardness prevention against cyber-attack.
Secure geographically separated offices, home or field-based workers, at their desks or on the go regardless of device type.
Patch management and system hardening ensure a seamless application experience that is free from vulnerabilities and cyber-attack.
Block user access to unnecessary or unauthorized cloud resources, keeping your data secure and your colleagues focused and productive.
Lite | Full | Complex | |
---|---|---|---|
Security Features Set | |||
File, Email and Web Threat Protection | |||
Ransomware and Exploit Prevention | |||
Firewall | |||
Network Attack Blocker | |||
Vulnerability Assessment | |||
Mobile protection (iPhone, Android) | Per user device | Per user device | Per user device |
Cloud Discovery | |||
Network Firewall Appliance - Intrusion prevention system - Anti-spyware and anti-spam - DDoS prevention - Dual WAN for load balancing - VPN IPsec / SSL VPN - Content filtering | |||
Manageability Features | |||
Cloud Blocking | |||
Security for Microsoft Office 365 | |||
Web Control | |||
Device control (e.g. USB, CD ROM, External hard drive etc) | |||
Encryption management | |||
Patch management | |||
Service Support Features | |||
8x5x4 Cyber Incident Response (Remote only) | |||
8x5x4 Cyber Incident Response (Remote and Onsite) | |||
24x7x4 Cyber Incident Response (Remote and Onsite) | |||
24hrs online monitoring | |||
Alert management and rectification | |||
Cybersecurity analysis reports | |||
Service Level Agreement | |||
Number of Devices | |||
< 10 computers | |||
< 20 computers | |||
< 30 computers |
By outsourcing the management of your IT to us, your business can focus on your core offering without worrying about IT outages and productivity.
By outsourcing the management of your data protection to us, your business can focus on your core offering without worrying about data lost and liability.
By outsourcing the management of your IT to us, your business can focus on your core offering without worrying about IT outages and productivity.
By outsourcing the management of your data protection to us, your business can focus on your core offering without worrying about data lost and liability.