hdr-servicedesk.jpg

Master MSSP Offering

Be Different. Deliver Excellence.

Collabrance Master MSSP Portfolio

Protect your customers with our 20+ layer master managed security services provider (MSSP) offering.

Our Master MSSP Offering includes several different security components that end-user customers seek and help our partners differentiate from their competition.

2018-Top-100-MSSP-Button.jpg
MSSP_Checklist.png

1. Antivirus Endpoint Security and Malware Protection
2. Application Control
3. Backup Disaster Recovery (BDR) Device Management
4. DNS Web Filtering
5. Email Archiving
6. Email Encryption
7. Email Security
8. Intrusion Detection & Prevention System (IDS & IPS)
9 . Multi-Wan
10. Network Access Control (NAC)
11. Patch Management
12. Remote Monitoring and Management (RMM)

13. Security Awareness Training
14. Secured Wireless Access Points (WAPs)
15. Security Information Event Management (SIEM)
16. Traffic Shaping
17. Two-Factor Authentication
18. Unified Threat Management (UTM) Device Management
19. UTM Network Based Antivirus
20. Virtual Private Network (VPN)
21. Vulnerability and Penetration (VUL/PEN) Testing
22. Web-Content Filtering

Our dynamic security offering will continue to evolve with our technology roadmap designed by our Product Development Team who proactively researches and vets products based on the needs of our partners and their end-user customers. Our Master MSSP Offering also aligns with key findings GreatAmerica identified in a recent survey to MSPs looking to evolve their security offering with demands in the IT channel. Download our MSSP Checklist to evaluate your current security offerings based on findings from the GreatAmerica survey.

Comprehensive Managed Security Services Offering

All of our products and services have been fully vetted by our Product Development Team, who also proactively manage our technology vendors. This allows you to focus on helping your customers and provide them peace of mind that appropriate steps have been taken to secure their network and critical information.

  • Antivirus is provided by 2 different manufacturers to protect an end-user's environment at 2 different levels.
    • Endpoint Security and Malware Protection guards all Windows and Mac devices.
    • Unified Threat Management (UTM) provides antivirus at the network edge.
  • Image-based Backup Disaster Recovery (BDR) takes a snapshot of all important data. In the event of a disaster, we can spin up an end-user's system(s) in a matter of minutes. Local and cloud virtualization options provide flexible and efficient access to critical systems.
  • DNS Web Filtering offers an easy and cost-efficient way to prevent end-user's access to inappropriate websites, block phishing sites and help prevent virus and malware infections.
  • Remote Monitoring and Management (RMM) services include:
    • Windows Server Event Log Monitoring
    • Automated Patch Environment
    • Automated Complex Password Requirements
  • Secured Wireless Access Points (WAPs) encrypt and encapsulate all wireless traffic through the wireless controller built into the UTM. All guest wireless traffic is routed directly out to the internet, with no access to the internal network.
  • Security Awareness Training to test and increase customer's awareness of security threats and apply safer practices.
  • Security Information Event Management (SIEM) monitors systems 24x7x365 with alerts sent and remediated on selected devices and event logs.
  • Two-Factor Authentication requires an end user to provide further means of authentication in addition to their username and password credentials. With our mobile app, a one-time token is generated to use as part of the login authentication process.
  • Vulnerability & Penetration (VUL/PEN) Testing is run against organizations public facing UTM to identify how vulnerable the organization is from the outside. If they are vulnerable, determine the level of penetration into their systems.
Collabrance---2-Technicians.jpg

Email Security Services Offering

Looking-at-Computer.jpg

Email Security solutions stop spam, phising and malware (known and emerging) with a detection rate over 99% and near-zero false positives. Updated every minute - our heuristics and recurrent pattern matching is fast and accurate with message fingerprinting, categorization and filtering.

  • Email Archiving automatically collects, archives and indexes all your emails and file attachments allowing you to adhere to regulatory, retention and industry compliance requirements. Our solution is a secure, fast and easy to use service that provides unlimited storage at a fixed price with eleven 9’s of resiliency.
  • Email Encryption allows a business to encrypt emails at the user level, organizational level or both. Easily encrypt emails based on company-wide rules and policies.

Unified Threat Management (UTM) Services

Fully managed and monitored Next Generation firewall provides the following Unified Threat Management (UTM) services:

  • Application Control - Create policies that allow, deny, or restrict access to applications or entire categories of applications.
  • Intrusion Detection and Prevention System (IDS and IPS) - Detect and protect a network from cybercriminal attacks, malicious activity and policy violations by actively seeking and blocking external threats before they reach network devices.
  • Multi-Wan Support multiple internet connections with flexibility in how the different Internet connections are utilized (Primary/Secondary or Primary/Primary).
  • Network Access Control (NAC) - Ensure computers and endpoints meet security requirements, otherwise they are not permitted access to the network.
  • Network Based Antivirus - Protection against the latest viruses, ransomware, spyware, and other content-level threats using industry-leading heuristic methods and advanced detection engines to prevent both new and evolving threats from gaining access to a network.
  • Traffic Shaping – Prioritize and/or limit bandwidth for specific categories of traffic.
  • UTM Management – Access to the UTM management interface is only accessible from the Collabrance Network Operations Center (NOC). All successful, as well as all failed login attempts, are logged and monitored.
  • Virtual Private Network (VPN) Create a virtual tunnel across a public network that allows remote users to access resources on a private network.
  • Web Content Filtering - Scans content of every accepted web page. The system administrator can specify banned content that is objectionable and/or not work related. When the web content filter scan detects banned content, it blocks the web page.
Collabrance-SA-Team.jpg

The Collabrance Technology Stack

Learn more about all of our comprehensive services we offer in our standardized and fully vetted technology stack.

Technology Stack
STAT_-_A80-776-46A_-_Vetted_Tech_Solutions.png