720-891-1663

Our Vetted Third-party Cybersecurity Technical Products

A complete cybersecurity program consists of people, processes, and technical products. Do you know that there are HUNDREDS of technical product CATEGORIES? Use us to help make sense of that nightmare.

We identify the kinds of products our small-to-medium enterprise (SME) clients need to operate securely. Then we go into the marketplace and make a list of all the manufacturers of such products and then vet them for suitability, price and (of course) security. For those we like, we become resellers. If you buy a technical product through us, you pay the same price you would pay if you went directly to the manufacturer. If you buy through us you also get the benefit of having us on your side if there are any issues. Please contact us for more information.

Cloud Backup Solution

As you know, you must back it up or you risk everything. We have vetted a full service cloud blackup solution for SMEs that need to backup O365 and other critical cloud data. NOTE: Backing up local data requires an additional product/solution--which is also available from us.

Compliance Impact: Both NIST CSF/PF and DoD 800-171 require it.

DNS Filtering/Protection

DNS filtering is a simple but powerful tool that identifies risky or malicious websites and prevents the user from going there. This is a no-brainer for everyone.

Compliance Impact: Not required, but necessary.

Encrypted File Sharing

Ultra-secure, encrypted file sharing platform that’s easy to use and incredibly affordable. Engineered by military minds, and meets regulated document requirements for government, defense, healthcare, education, and many other businesses that need to share and collaborate on files.

Compliance Impact: Required by both NIST CSF/PF, DoD 800-171 and ITAR.

Encrypted Hard Drives

Small company business owners should keep NO sensitive company information on their laptops. Solve this common security vulnerability by storing ALL sensitive company and personal information on an Apricorn, encrypted, external hard drive. We have vetted and approved the following hard drives:

Apricon Aegis Secure Key 3NX(4GB to 128GB): USB flash drive that provides a high level of data security. It uses 256-bit AES XTS encryption to protect your data, which is a very strong encryption standard. It also has FIPS 140-2 level 3 validation, which means it meets certain requirements for information technology security set by the U.S. government.

Aegis Padlock DT 256-Bit Encrypted USB 3.0 Hard Drive(500GB to 2TB): Designed to secure sensitive data. It requires a PIN code to access the drive and is compatible with both Windows and Mac computers.

Aegis Padlock USB 3.0 256-Bit AES XTS Hardware Encrypted(2TB-22TB): Similar to Aegis Padlock DT and requires a PIN code to access the drive. It also has additional security features such as a brute force protection system and self-destruct mode.

File Security

Comprehensive security, integrity and compliance application that is easy to deploy and scales to the largest of global networks. The automated detection process, flexible response options, and auditing capabilities make it a powerful compliance, information assurance, and security tool.

Compliance Impact: May not be required for your situation.

Multi-factor Authentication

Cost-effective, cloud-based, secure multi-factor authentication tool. Lock down access to any application, by any user, on any device, within any network architecture.

Compliance Impact: Recommended by both NIST CSF/PF and required by DoD 800-171.

Password Protection

Vastly increase security, save time and brain damage by using our vetted, secure password vault/authenticator to instantly access web sites and applications.

Compliance Impact: Recommended by NIST CSF/PF and DoD 800-171.

Security Awareness Training

We have aligned with the world's largest, most cost-effective security awareness training platform for small and larger companies. Platform includes a comprehensive phishing training tool and the best selection of training content available. We are experts in the operation of this system and can help you get the most value.

Compliance Impact: Required by both NIST CSF/PF and DoD 800-171.

System Inventory

You cannot control and secure it unless you know that it exists and what it connects to. One of the first steps of building a secure IT infrastructure is to build an IT infrastructure inventory. We have found inexpensive technical tools that do this heavy lifting for you. Plus, don't you want to know that the software that inventories your IT infrastructure is protecting that data? Why re-invent the wheel? We have found an affordable solution that creates an accurate and up-to-date central inventory of software, hardware, and security assets for each machine.

Compliance Impact: Required by NIST CSF/PF and DoD 800-171.

    Read our position paper:
  • Inventories and Network: Why IT Inventories and Network Mapping are Critical Risk Management Tools:  Click Here

System Monitoring

Whether your IT infrastructure is on-premise, in the cloud or both, it is a compliance requirement to monitor that system for threats and other problems. It's common sense. But what is not common sense is the bewildering array of potential monitoring solutions. And these solutions can be very expensive. We have spent years analyzing these solutions and have identified those that best suit the needs of our SMEs...i.e. automated, easy to use, and affordable. These are automated systems that use machine learning and other technologies to monitor networks and detect threats, analyze log and other data, and send reports and alerts to management.

Compliance Impact: Both NIST CSF and NIST PF require it. Also, DoD 800-171 requires it. You can get 30+ points towards 800-171 requirements by installing such a system.

    Read our position paper:
  • Monitoring: IT Infrastructure Monitoring Issues-Making the Best Choice for Your Company:  Click Here

System Security Rating Report

These amazing systems can monitor your IT infrastructure remotely and tell you how secure it is in many ways...including which bad guys are regularly communicating with components of your systems. You can also use these systems to monitor your critical third party vendors. We know this product category well and can save you much brain damage here.

Compliance Impact: May meet your monitoring requirements and third party risk management requirements.

Threat Monitoring

Threat monitoring is a bit different than system monitoring above. The solution is a managed detection and response (MDR) platform that helps customers detect threats and respond and recover from attacks. Please call us for a more in-depth discussion.

Compliance Impact: This may or may not be a requirement for you.

Please call us for more information: 720-891-1663

z z