How good is your cybersecurity – but what makes you so sure it is?

Improving security from online threats is among the top priorities of today’s distributed, global enterprises. Save9 provides customers and its business partners with the resources they need to build a Cybersecurity strategy built on globally recognised cyber standards - such as: Organisations often tell us they have no idea whether, or assume, their network is secure  because  they  have  outsourced  all IT support to  a  third  party. However, outsourcing  a  service  does  not  mean  abdicating responsibility – at the very least if you’re paying for a service it makes good business sense to ensure you are getting adequate cyber protection included. Save9 cybersecurity solutions provide business operations with multiple layers of network security and provide access management down to individual endpoints - controlled by a unified policy system whilst delivering simplicity and lower total cost of ownership. Cyber Essentials is a government-backed, industry supported scheme to help organisations protect themselves against common cyber attacks. This PDF document - '10 Steps To Cyber Security: Information Risk Management Regime' can help you establish and then actively maintain the secure configuration of your ICT systems.

This document is not public.
Only the owner and explicitly shared collaborators will be able to view it.

USB Device Blocking Solution

Endpoint Device Control to block USB Drives Symantec Endpoint Protection Ability to detect and protect against harmful files from USB storage devices - Administrators can deploy a Symantec Endpoint Protection Application and Device Control policy to block all USB Thumb Drives and USB Hard Drives on managed Symantec Endpoint Protection (SEP) clients. However - you also have the freedom to allow authorised-only USB Drives (e.g. encrypted models of choice) to work normally within your organisation - i.e. not blocking a specific USB drive in the Device Control policy. You can gather the Device ID for the specific device and add that device into the Hardware Devices list in the Symantec Endpoint Protection Manager (SEPM) Application and Device Control policy.

Network Intrusion Monitoring & Protection

Enterprise Level IPS/IDS (server-layer)
Trend Micro Deep Security 9

Trend Micro's Deep Security Platform - to reap the benefits of virtualisation and be efficient an IPS/IDS security solution built for virtual environments must be automated as part of the data centre provisioning process. Deep Security not only ensures physical servers and virtual machines (VMs) are protected the moment they are provisioned, it also recommends and applies only the policies that are relevant. Deep Security fits dynamic environments, by following VMs as they are brought up and down.

Deep Security’s capabilities include:

  • Anti-malware/Web-reputation protects against malware attacks
  • File and system integrity monitoring for compliance
  • Intrusion detection/protection shield unpatched vulnerabilities
  • Stateful firewall perimeter around each phsyical or virtual server
  • Log inspection to identify and report important security events

Business Unit Level IPS/IDS (network-layer)
Network traffic analysis combining traffic 'sniffing' together with application layer decoding, categorisation, analysis and statistics - enabling you to analyse in great depth your Internet traffic. IT staff can use it as a professional aid to improving efficiency and detecting potential problems - capturing actual live data (e.g. content of emails or Instant Messaging) coming into or out of your network as well as providing statistics on data type activity and specific files uploaded/downloaded.