13
Managed Compliance-as-a-Service umbrella by m-theory

Managed Compliance-as-a-Service · Firewall Analysis: verifies outbound ... • Spam filtering • Email-borne malware protection • Anti-phishing protection ... Barracuda Sentinel

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

  • Managed Compliance-as-a-Service

    umbrella by m-theory

  • Robust Managed Cybersecurity ServicesCybersecurity for any business is not only about adding layers of security technology. It starts with understanding and managing a business’s cybersecurity risks. M-Theory helps businesses understand how to best identify and protect vital data and technology assets, and how to detect, respond to and recover from a cybersecurity incident.

    Our umbrella objective is simple: Identify potential cyber and compliance risks by assessing vulnerabilities, threats, asset value and the probability of occurrence and providing real-time stats.

    Although we make it look easy, our umbrella solution is complex: Upon identification of risks, we design a Remedy Action Plan, execute the plan and provide ongoing maintenance of new policies around data governance. Utilizing cutting edge-cloud technologies, umbrella provides the ultimate protection.

  • playbook

    - All businesses are concerned about cybersecurity breaches and how they would impair their image and customer trust.

    - To understand the service level needed, M-Theory will help to assess your infrastructure, identify where resiliency is needed and develop a roadmap to optimal security & compliance.

  • 1. Security Risk : quantify issues into measurable values that can be tracked over time.

    2. Security Risk Analysis Engine: an examination of the massive quantity of data, as it pertains to, best practices, violations and issues.

    3. Security Audit Log Analysis: the results of thousands of log entries across the network for anomalous and failed logins.

    4. Security Permission Reviews: an appraisal of share permissions, group policy settings and RSOP analysis.

    5. Scan of Perimeter Defenses: ensures perimeter defenses are protecting properly with routine, external vulnerabilities scans.

    6. Firewall Analysis: verifies outbound firewall configuration to block unnecessary outbound traffic and filtering to reduce works and ransomware.

    7. Egress Filtering review: finds lack of Egress Filtering (blocking outbound traffic). One of the most misconfigured firewall settings.

    8. Data Breach Liability Report: the report that monetizes a customer’s potential liability by scanning for personal data that can be compromised in a data breach.

    execute

  • - Endpoint Monitoring allows you to detectknown security vulnerabilities & suspiciousactivity.

    - Automated Incident Reporting instantly uploads logs to the cloud, enabling fast remediation supported by our team of analysts.

    - Remediation Suggestions empower your security.

    - Detailed Analytics provide incident reports, identify weaknesses, improve response times & workflow from an in-portal multi-tenant dashboard.

    - 100% of Files & Traffic inspected

    - Single Portal for viewing All Feeds

    - Full Ticketing Integration with industry’s leading PSA tools

    - Access toMITRE ATT&CK framework & Threat Intelligence

    - 24/7 Monitoring by Security Analysts in four global 24/7 SOCs- Easy to deploy. nylon is built to get running easily on all endpoints via MSI in an automated

    process.

    - Non-invasive. nylon uses a background process, easy to integrate into existing services.

    - Secure Access Provided. Our MFA-enabled management portal controls access via SSO.

  • Static AI Pre-execution protection for known and unknown file based malware

    Behavioral AI Agent side behavioral monitoring covering any attack vector, including unknown exploits and bypass attempts of traditional AV

    Documents, Scripts Behavioral AI engine built to detect and mitigate malicious code and scripts in documents

    Fileless, Exploits Behavioural AI engine capable of detecting fileless attacks and exploits

    Lateral Movement Behavioral AI engine focused on discovering attempts coming from another device over the network

    PUP macOS engine to protect from potentially unwanted programs

    Device Control Apply policy and control USB and peripheral devices connected to your assets

    Firewall Control Manage the personal firewall on your endpoints

    Device Control

    Apply policy and control USB and peripheral devices connected to your assets

    Firewall Control

    Manage the personal firewall on your endpoints

  • Multi-layered AI-powered protection to replace Anti-Virus products

    Remediation Clean all artifacts of a malicious attempt, including registry, scheduled tasks and more

    Rollback Revert an endpoint to its pre-infected state

    Network Quarantine Upon detection, SentinelOne can immediately stop lateral threat spread cold by disconnecting the infected endpoint from the network while still maintaining the agent’s connection to the management console

  • Enterprise Mobility + SecurityWhat is Enterprise Mobility + Security?Microsoft Enterprise Mobility + Security provides an identity-driven security solution that offers a holistic approach to the security challenges in this mobile-first, cloud-first era. Our technologies not only help you protect your organization but also identify breaches before they cause damage.

    We have two offerings :

    •Enterprise Mobility + Security E3 includes Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection P1, Microsoft Advanced Threat Analytics, Azure Rights Management (part of Azure Information Protection) and the Windows Server CAL rights.

    •Enterprise Mobility + Security E5 includes all the capabilities of Enterprise Mobility + Security E3 plus Azure Active Directory Premium (AADP) P2, Azure Information Protection P2, Microsoft Cloud App Security, Azure Active Directory [AD] Identity Protection (as a feature of AADP P2), Azure Advanced Threat Protection, Azure AD Privileged Identity Management (as a feature of AADP P2).

  • • Real-time detection for threat analysis with 24/7 updates and protection

    • 100% cloud-based: No hardware or software required

    • Granular policy management• Outbound protection through DLP

    and Email Encryption

    • Virus scanning and filtering• Spam filtering• Email-borne malware protection• Anti-phishing protection• Typosquatting protection• Archiving for compliance• Automatic encrypted emails• O365 backup• Link protection• Advanced threat protection

  • Barracuda Sentinel

    Combine artificial intelligence, deep integration with Microsoft Office 365, and brand protection into a comprehensive cloud-based solution that guards against these potentially devastating attacks.

  • Barracuda Managed Phishline

    Patented SimulationsTrain your employees to spot email threats that can compromise data and result in financial and reputational loss. Total Email Protection PortfolioPhishLine is part of Barracuda’s Total Email Protection portfolio, delivering truly comprehensive email security.Curated ContentDozens of simulation templates, landing pages, risk-assessment surveys, and other training content. GamificationVideos, infographics, newsletters, and other materials supplement core training.Levelized ProgramsAs employees progress through their training program, the content constantly changes, challenging them to continuously improve their phishing detection and reporting skills.

    true user compliance awareness

  • get in touch| [email protected] | 213.785.8058

    Founded in Los Angeles in 2007Serving the Globe

    Slide Number 1Slide Number 2Slide Number 3Slide Number 4Slide Number 5Slide Number 6Slide Number 7Slide Number 8Slide Number 9Slide Number 10Slide Number 11Slide Number 12Slide Number 13