Master MSSP Offering

Be Different. Deliver Excellence.

Collabrance Master MSSP Portfolio

Protect your customers with our 21-layer master managed security services provider (MSSP) offering.

1. Antivirus Endpoint Security and Malware Protection
2. Application Control
3. Backup Disaster Recovery (BDR) Device Management
4. DNS Web Filtering
5. Email Archiving
6. Email Encryption
7. Email Security
8. Intrusion Detection & Prevention System (IDS & IPS)

9 . Multi-Wan
10. Network Access Control (NAC)
11. Patch Management
12. Remote Monitoring and Management (RMM)
13. Secured Wireless Access Points (WAPs)
14. Security Information Event Management (SIEM)
15. Traffic Shaping
16. Two-Factor Authentication

17. Unified Threat Management (UTM) Device Management
18. UTM Network Based Antivirus
19. Virtual Private Network (VPN)
20. Vulnerability and Penetration (VUL/PEN) Testing
21. Web-Content Filtering

Comprehensive Managed Security Services Offering

All of our products and services have been fully vetted by our Product Development Team, who also proactively manage our technology vendors. This allows you to focus on helping your customers and provide them peace of mind that appropriate steps have been taken to secure their network and critical information.

  • Antivirus is provided by 2 different manufacturers to protect an end-user's environment at 2 different levels.
    • Endpoint Security and Malware Protection guards all Windows and Mac devices.
    • Unified Threat Management (UTM) provides antivirus at the network edge.
  • DNS Web Filtering offers an easy and cost-efficient way to prevent end-user's access to inappropriate websites, block phishing sites and help prevent virus and malware infections.
  • Remote Monitoring and Management (RMM) services include:
    • Windows Server Event Log Monitoring
    • Automated Patch Environment
    • Automated Complex Password Requirements
  • Image-based Backup Disaster Recovery (BDR) takes a snapshot of all important data. In the event of a disaster, we can spin up an end-user's system(s) in a matter of minutes. Local and cloud virtualization options provide flexible and efficient access to critical systems.
  • Secured Wireless Access Points (WAPs) encrypt and encapsulate all wireless traffic through the wireless controller built into the UTM. All guest wireless traffic is routed directly out to the internet, with no access to the internal network.
  • Two-Factor Authentication requires an end user to provide further means of authentication in addition to their username and password credentials. With our mobile app, a one-time token is generated to use as part of the login authentication process.
  • Security Information Event Management (SIEM) monitors systems 24x7x365 with alerts sent and remediated on selected devices and event logs.
  • Vulnerability & Penetration (VUL/PEN) Testing is run against organizations public facing UTM to identify how vulnerable the organization is from the outside. If they are vulnerable, determine the level of penetration into their systems.

Email Security Services Offering


Email Security solutions stop spam, phising and malware (known and emerging) with a detection rate over 99% and near-zero false positives. Updated every minute - our heuristics and recurrent pattern matching is fast and accurate with message fingerprinting, categorization and filtering.

  • Email Archiving automatically collects, archives and indexes all your emails and file attachments allowing you to adhere to regulatory, retention and industry compliance requirements. Our solution is a secure, fast and easy to use service that provides unlimited storage at a fixed price with eleven 9’s of resiliency.
  • Email Encryption allows a business to encrypt emails at the user level, organizational level or both. Easily encrypt emails based on company-wide rules and policies.

Unified Threat Management (UTM) Services

Fully managed and monitored Next Generation firewall provides the following Unified Threat Management (UTM) services:

  • Application Control - Create policies that allow, deny, or restrict access to applications or entire categories of applications.
  • Intrusion Detection and Prevention System (IDS and IPS) - Detect and protect a network from cybercriminal attacks, malicious activity and policy violations by actively seeking and blocking external threats before they reach network devices.
  • Multi-Wan Support multiple internet connections with flexibility in how the different Internet connections are utilized (Primary/Secondary or Primary/Primary).
  • Network Access Control (NAC) - Ensure computers and endpoints meet security requirements, otherwise they are not permitted access to the network.
  • Network Based Antivirus - Protection against the latest viruses, ransomware, spyware, and other content-level threats using industry-leading heuristic methods and advanced detection engines to prevent both new and evolving threats from gaining access to a network.
  • Traffic Shaping – Prioritize and/or limit bandwidth for specific categories of traffic.
  • UTM Management – Access to the UTM management interface is only accessible from the Collabrance Network Operations Center (NOC). All successful, as well as all failed login attempts, are logged and monitored.
  • Virtual Private Network (VPN) Create a virtual tunnel across a public network that allows remote users to access resources on a private network.
  • Web Content Filtering - Scans content of every accepted web page. The system administrator can specify banned content that is objectionable and/or not work related. When the web content filter scan detects banned content, it blocks the web page.

The Collabrance Technology Stack

Learn more about all of our comprehensive services we offer in our standardized and fully vetted technology stack.

Technology Stack