Security-first vendors with best-in-class solutions.
Technology Vendors & Solutions
Advanced Threat Protection for Email
What does Collabrance use for Advanced Threat Protection for email?
Collabrance uses Microsoft's cloud-based email filtering service to help protect against unknown malware and viruses by providing zero-day protection. It is also commonly referred to as "Advanced Spam Filter".
Why do my customers need Advanced Threat Protection?
Multiple features including protection and detection of attachments, link and anti-phishing policies
Holistic protection in Microsoft Teams, Word, Excel, PowerPoint, Visio, SharePoint Online, and OneDrive for Business
Dark Web Monitoring
What vendor does Collabrance use for Dark Web Monitoring?
Collabrance uses ID Agent’s Dark Web Monitoring service to monitor for exposed credentials on the Dark Web.
What are the benefits of Dark Web Monitoring?
Collabrance alerts affected parties of exposed credentials on the Dark Web associated with their domain(s). These alerts notify the affected parties of the need to change passwords in an effort to avoid their accounts being compromised.
Data Loss Prevention
What does Collabrance use for Data Loss Prevention?
Collabrance uses Microsoft's DLP solution to create policies that identify sensitive information such as social security numbers, or credit card numbers that are included in documents stored in SharePoint or sent in plain text in Exchange. The policies have the ability to notify the user and potentially block access to the file or decline to send the email.
What are the benefits to offering Data Loss Prevention?
Identify sensitive information on: Exchange Online, SharePoint Online, OneDrive
Prevent accidental sharing of sensitive information
Help users learn how to stay compliant without interrupting workflow
Reporting may assist with organizations' DLP policies
*Must be utilizing Exchange Online Plan 2, E3 or E5 O365 License
What does Collabrance use for drive encryption?
Collabrance uses Microsoft's data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen or inappropriately decommissioned computers.
What are the benefits of drive encryption?
Protects confidential data, protects systems data, disk disposal and keys are backed up within Active Directory
*Drive Encryption is for laptops; workstations can be included but default will be for laptops only
Endpoint Detection & Response
What does Collabrance use for Endpoint Detection and Response?
Collabrance uses a Next Generation Endpoint Threat Detection agent through SentinelOne to provide unparalleled visibility, detection, and containment of tomorrow’s most advanced threats. Through cross-platform visibility into endpoint activities, such as process execution, network communications, file access, applications, DNS requests, and encrypted web traffic – Collabrance is able to record and identify the source of any threat. The lightweight and high-performance SentinelOne endpoint agent utilizes a static Artificial Intelligence (AI) engine to provide pre-execution threat detection and behavioral AI engines to detect threats upon execution – offering the most advanced identification of known and unknown threats available today.
What are the benefits of Endpoint Detection and Response?
Collabrance uses Solarwinds to help protect the intellectual capital stored in business documents without the cost of broad full workstation backup.
What are the benefits of selling named file backups?
Two automated documents backups per day
56 versions to restore from per 28-day period
Over 50 types of documents including documents, presentations and spreadsheets (.doc, .pdf, .rtf, .ppt, .csv, .xlsx, etc.)
What does Collabrance use for Password Management?
Collabrance uses MyGlue from ITGlue to help you store all of your work related passwords securely, as well as provide the ability to share passwords securely and efficiently.
What are the benefits of providing Password Management?
Chrome Extension for auto password look-up
Mobile App to access passwords
At-rest and in-transit password encryption keeps data safe
Immutable audit trail
Collaboration with IT provider, no more sensitive data over email or sticky notes
Security Awareness Training (SAT)
Who does Collabrance use for Security Awareness Training?
Collabrance uses KnowBe4 administered by Cyberstone. This Security Awareness Training (SAT) offers comprehensive cybersecurity education that is easy to administer and delivers measurable results. Email simulations and training consist of concise, relevant, interactive courses and campaigns that minimize risk due to human error. This results in lower infection rates, helping drive down remediation costs. Security Awareness Training is also required to comply with multiple regulations.
What are the benefits of offering Security Awareness Training?
Baseline Email Phishing Campaign
Initial Security Awareness Video
Weekly & Monthly Phishing Campaigns
Quarterly Video Training based on vertical sector
VPN User Multi-Factor Authentication
Who does Collabrance use for VPN Multi-Factor Authentication?
Collabrance uses Fortinet's FortiToken Mobile application for confirming a user's identity by using a combination of two different factors: Username/Password and temporary one-time password. FortiToken Mobile 2FA works in conjunction with the on premise next generation firewall, for the purpose of allowing authorized remote users secure access to internal network resources.
Is FortiToken Mobile compatible with my device?
FortiToken Mobile is compatible with Android, iOS and Windows mobile devices.
Why do I need to provide VPN User Multi-Factor Authentication?
Eliminates the need for an additional/external RADIUS server
Second authentication factor for SSL VPN, IPSec VPN, Captive Portal and Administrative login
FAQs with Collabrance Vendors
Does Collabrance have any assessment tools available to
assist with the sales and discovery process?
Yes, Collabrance has two assessment tools available
Risk Assessment Tool from Etactics called K2 Compliance. This
assessment tool includes NIST, PCI and other compliance based questionnaires to evaluate an
organization’s risks and severity, current controls in place and
mitigation strategies related to those risks. K2 Compliance also has the
ability to assist with organization’s Governance, Risk & Compliance
needs including policy review and policy creation.
A Network Assessment Tool through InfoGPS – This
assessment tool utilizes three features: data asset discovery,
vulnerability scanning and index of Metadata. This tool also has
additional reporting capabilities including file activity, file
classification and newly
Email Security Services
What email security services does Collabrance include in the MSSP Offering?
Advanced Threat Protection stops spam, phishing and malware
(known and emerging) with a detection rate over 99% and near-zero false
positives. Updated every minute - the heuristics and recurrent pattern
matching is fast and accurate with message fingerprinting, categorization
Email Archiving automatically collects, archives and indexes all your emails and file attachments, which may assist with adherence to regulatory, retention and industry compliance requirements. This solution is a secure, fast and easy to use service that provides unlimited storage at a fixed price with eleven 9’s of resiliency.
Email Encryption allows a business to encrypt emails at the user level, organizational level or both. Easily encrypt emails based on company-wide rules and policies.
Unified Threat Management (UTM)
What UTM services does Collabrance include in the MSSP Offering and what do they do?
Fully managed and monitored Next Generation firewall provides the following Unified Threat Management (UTM) services:
Application Control - Create policies that allow, deny, or restrict access to applications or entire categories of applications.
Intrusion Detection and Prevention System (IDS/IPS) - Detect and protect a network from cybercriminal attacks,
malicious activity and policy violations by actively seeking and
blocking external threats before they reach network devices.
Support multiple internet connections with flexibility in how the
different Internet connections are utilized (Primary/Secondary, Load Balancing or even SD-WAN).
Network Based Antivirus - Protection against the latest viruses, ransomware, spyware, and other content-level threats using industry-leading heuristic methods and advanced detection engines to prevent both new and evolving threats from gaining access to a network.
Traffic Shaping – Prioritize and/or limit bandwidth for specific categories of traffic.
UTM Management – Access to the UTM management interface is only accessible from the Collabrance Network Operations Center (NOC). All successful, as well as all failed login attempts, are logged and monitored.
Virtual Private Network (VPN) – Create a virtual tunnel across a public network that allows remote users to access resources on a private network.
Web Content Filtering - Scans content of every accepted web page. The system administrator can specify banned content
that is objectionable and/or not work related. When the web content
filter scan detects banned content, it blocks the web page.
SIEM (Security Information Event Management)
What is SIEM?
SIEM (Security Information Event Management) is a software that combines all security events from device logs and centralizes that data into one source for security analysis, information, authentication events, audit events, etc.
We use various endpoint protection solutions, do I need a SIEM?
Many vendors offer endpoint security or endpoint
protection solutions that provide protection of computer networks . However, these endpoint solutions are not able to
correlate various events types across all devices. That is where SIEM is able to take those
correlated events and tie them together to alert on a potential high risk
Can I block attacks by using a SIEM solution?
SIEM solutions do not provide you with the ability to block attacks. They provide you with the information needed to identify when anomalous behavior is occurring on your network. Human analytics (SOC Services) are required to validate whether a breach has occurred. Without a SIEM solution to trigger the initial alert, the exploit will go unnoticed.
What vendor does Collabrance use for SIEM and SOC Services?
Collabrance uses Nuspire for the combination of network monitoring technology (SIEM) and expertise (SOC) needed for compliance, security and peace of mind.
Why provide SIEM and SOC Services?
High-speed, real-time analysis of event logs including intelligent alerting and dynamic drill down reporting
24x7x365 SOC with human analytics, network operations management with monitoring and analysis
Security threat research through trends, security issues, government intelligence and other deep internet data sources
SOC 2 compliant - compliance with GLBA, PCI-DSS and NIST Standards
Provide Your Customers the Best.
Security threats are growing, is your managed services offering?
Cybersecurity challenges and attacks are increasing on a daily basis. The Collabrance MSSP Offering is ready to help keep you and your customer ahead with our best-in-class offerings. Connect with our team to learn more about your opportunity to work with Collabrance and ways we can help you scale your managed services business faster with while mitigating risk and managing overhead.
Protect customers' networks and data, help them better understand, manage and mitigate their risk. Collabrance offers solutions guided by the NIST Cybersecurity Framework and may be able to assist with your customers' compliance needs.