CyberSecurity Essentials
Protect critical areas of your business with this collection of modules for endpoints, email, and cloud apps
Tags :
EndPoint Security
Device Posture: Apply device posture policies to users or groups and determine the remediation action for vulnerabilities
Next-gen Antivirus: Advanced threat protection (ATP) analyses both static files and running processes for anomalies and suspicious behavior
Allow/Block Lists: Create lists of files, folders, and processes to allow or block, protecting your endpoints from known threats and vulnerabilities
Email Security
Malware Scanning: Identify and quarantine emails with potential malware or ransomware attachments
Email Phishing Protection: Prevent threats from domain impersonation, spoofing, and other misleading phishing attempts
Allow/Block Lists: Create and maintain a list of individual senders or sending domains to allow or block from your business inboxes
EDR
Endpoint Detection & Response: Reboot or shut down devices remotely, isolate infected devices from the network, or block specific processes
Cloud Security
Cloud Security: Stop abnormal admin activity, access violations, ID compromise, malware, and mass data changes in cloud apps
Term | |
---|---|
Term | 60 Months or 48 Months or 36 Months or 24 Months or 12 Months or Monthly Uncontracted |
Uncategorized | |
Manged Services | Self managed or Managed |