Practical and Powerful Defenses
CORE Security by Accellis SecOps
Accellis CORE Security is our premier Managed Security Solutions Provider (MSSP) offering. It’s your digital security guard, protecting all of your IT assets in one powerful package paid for by most of the tools you already own but aren’t using today. This lowers your net-new security spend by more than 90%, while offering you enterprise capabilities previously exclusive to Fortune 500 companies.
By leveraging the Microsoft Public Cloud and your existing M365 license, we are able to provide a single pane of glass covering Multi-Factor Authentication, Conditional Access, Single Sign On, Vulnerability Management, DNS Protection, Email Protection, M365 & Desktop Backup & DR, CloudGen/Endpoint Detection & Response Antivirus, On-Premises Hardware Analytics, End-User Phishing Campaigns & Training, and Monthly Network Hardening, at no added cost to your existing M365 spend (*some restrictions apply). With optional SOC+XDR, 24×7 human monitoring and incident response, traditional VM scan engines, policy work, and breach testing, you are ready to meet any challenge.
Identity Security + Device Security + Data Security for all your users on all your devices (including BYOD) regardless where the users are, when they work, or what they work on – for coverage across your entire digital estate, 24×7.
Key Cybersecurity Offerings
Backup & DR
Your top threats in the SMB space are email and ransomware. Preparedness means having onsite and offsite backups that you have absolute certainty you can restore. Our backup solutions cover all physical and virtual workloads (on-premises and cloud), including M365, and offer multiple layers of redundancy. And, though it’s most important that you can restore, your ability to restore quickly is essential, too. That’s why our solutions can obtain any RTO/RPO.
When it comes to cybersecurity, email is the weakest access point, acting like an open door for 94% of malware breaches. The good news is that securing email is also one of the most cost-effective safety measures you can take, and Accellis has an arsenal of solutions to protect you and your network. Our solutions include domain fraud prevention, anti-spoofing, anti-impersonation, AI-based anti-spear phishing and anti-spam, cloud BDR with unlimited storage, and ongoing security training, all for a flat-rate monthly fee per user.
As experts in cybersecurity consulting, Accellis can provide invaluable insight into your security, compliance, and risk. Our staff have attained some of the industries best security certifications including CEH, OSCP, and CISSP. In the simplest terms possible, our assessments provide a snapshot of what you have, what you need, and how to bridge the gap. We look at the complete picture – from infrastructure design to policies and procedures to workflow considerations and beyond. And we won’t abandon you with just a dossier of data. We can continue to work with you to implement our recommendations.
It used to be that VM scanning required your devices to be onsite and behind your four walls; no longer. With Defender for Endpoint, we are able to scan all your assets, including BYOD, regardless of where they are. Some organizations still require traditional monthly external and internal scans, with remediation reports; we do that too. And since your staff is already busy, if you need us, we’re there to help remediate discovered vulnerabilities. Vulnerability management is required by many industries and regulators and is the necessary last step (after Windows Updates and third-party patching) to prevent brute-force entry into secure systems.
Our customized penetration tests are designed to challenge your network security and elucidate areas that need improvement. Engagements can include running an external scan and attempting to brute force the top attack vectors, or we can customize a more detailed approach to include social engineering, dark web searches, spear-phishing, web scraping, and even physical security testing. In one of our recent tests, providing our security engineer with just the organization’s name and website address, we were able to secure nine Office 365 usernames and passwords in four minutes by spoofing a 365 login page and sending a spam email from a fake administrator at the firm.
One of the lowest cost, highest impact security investments you can make is MFA. Basic 2FA is included in all M365 plans. Once implemented, it almost takes a nation state to breach you. Hackers move on to lower hanging fruit. MFA means a hacker needs to pass through a few safety nets before they can access your equipment, software, or data. These may include something you know (i.e., password), something you have (i.e., trusted device), or something you are (i.e., biometric). Our MFA solutions can factor in geography (i.e., no login from outside the US), user behavior (i.e., risky sign in), anomalous activity (i.e., impossible travel), and even more advanced features like dark web searches to ensure your credentials aren’t for sale online somewhere.
SOC, EDR and XDR
Working with our sister company, AgileBlue, we provide outsourced Security Operations Center as a Service with full XDR capabilities. With Defender for Endpoint, we are able to provide full EDR including enabling automatically quarantining infected assets for self-healing. Our solutions deliver 24×7 human monitoring, alerting, and logging, together with real-time incident detection and response. The average breach goes unnoticed for 45 days; this is where the real damage is done. Man in the middle attacks make a living off these 45 days. SOC/EDR/XDR allow us to reduce that intrusion to mere minutes providing you with the ability to stop the attack, prevent data loss, and eliminate the need to notify clients and law enforcement. Traditionally, to get a SOC, you needed to spend six figures buying a solution like Splunk and then another six figures staffing it. No longer.
User Phishing & Training
Even with the best security technology and policies in place, your defense is only as strong as the humans involved. While the best systems alleviate the possibility for users to make mistakes, users will nonetheless find themselves confronted by criminals at some point. It’s here, at this moment, that your investment or lack of investment in security training can make or break all the work you’ve done. Security training for your staff is necessary to build a culture of caring. Caring about each other, the business they work for, its clients and stakeholders. Accellis provides custom training courses designed to engage and educate your staff to rapidly increase awareness. These benefits will extend beyond the workplace into every aspect of your employees’ lives. We also offer monthly employee phishing campaigns, fully managed by our expert staff.
When it comes to your IT infrastructure and technology, prevention is the best defense. Accellis can help you look at every element through the eyes of a hacker and then address the gaps strategically and cost-effectively. We understand the importance of security, but we also understand your business and the importance of productivity. Our experienced and certified cybersecurity consulting staff will provide you with the highest level of personalized and relationship-focused service, keeping your business running smoothly and safely.