All of our products and services have been fully vetted by our Product Development Team, who also proactively manage our technology vendors. This allows you to focus on helping your customers and provide them peace of mind that appropriate steps have been taken to secure their network and critical information.
Antivirus is provided by 2 different manufacturers to protect an end-user's environment at 2 different levels.
Endpoint Security and Malware Protectionguards all Windows and Mac devices.
Unified Threat Management (UTM) provides antivirus at the network edge.
Image-based Backup Disaster Recovery (BDR) takes a snapshot of all important data. In the event of a disaster, we can spin up an end-user's system(s) in a matter of minutes. Local and cloud virtualization options provide flexible and efficient access to critical systems.
DNS Web Filtering offers an easy and cost-efficient way to prevent end-user's access to inappropriate websites, block phishing sites and help prevent virus and malware infections.
Remote Monitoring and Management (RMM) services include:
Windows Server Event Log Monitoring
Automated Patch Environment
Automated Complex Password Requirements
Secured Wireless Access Points (WAPs) encrypt and encapsulate all wireless traffic through the wireless controller built into the UTM. All guest wireless traffic is routed directly out to the internet, with no access to the internal network.
Security Awareness Training to test and increase customer's awareness of security threats and apply safer practices.
Security Information Event Management (SIEM) monitors systems 24x7x365 with alerts sent and remediated on selected devices and event logs.
Two-Factor Authentication requires an end user to provide further means of authentication in addition to their username and password credentials. With our mobile app, a one-time token is generated to use as part of the login authentication process.
Vulnerability & Penetration (VUL/PEN) Testing is run against organizations public facing UTM to identify how vulnerable the organization is from the outside. If they are vulnerable, determine the level of penetration into their systems.
Email Security Services Offering
Email Security solutions stop spam, phising and malware (known and emerging) with a detection rate over 99% and near-zero false positives. Updated every minute - our heuristics and recurrent pattern matching is fast and accurate with message fingerprinting, categorization and filtering.
Email Archiving automatically collects, archives and indexes all your emails and file attachments allowing you to adhere to regulatory, retention and industry compliance requirements. Our solution is a secure, fast and easy to use service that provides unlimited storage at a fixed price with eleven 9’s of resiliency.
Email Encryption allows a business to encrypt emails at the user level, organizational level or both. Easily encrypt emails based on company-wide rules and policies.
Unified Threat Management (UTM) Services
Fully managed and monitored Next Generation firewall provides the following Unified Threat Management (UTM) services:
Application Control - Create policies that allow, deny, or restrict access to applications or entire categories of applications.
Intrusion Detection and Prevention System (IDS and IPS) - Detect and protect a network from cybercriminal attacks,
malicious activity and policy violations by actively seeking and
blocking external threats before they reach network devices.
Support multiple internet connections with flexibility in how the
different Internet connections are utilized (Primary/Secondary or
Network Access Control (NAC) -Ensure computers and endpoints meet security requirements, otherwise they are not permitted access to the network.
Network Based Antivirus - Protection against the latest viruses, ransomware, spyware, and other content-level threats using industry-leading heuristic methods and advanced detection engines to prevent both new and evolving threats from gaining access to a network.
Traffic Shaping – Prioritize and/or limit bandwidth for specific categories of traffic.
UTM Management – Access to the UTM management interface is only accessible from the Collabrance Network Operations Center (NOC). All successful, as well as all failed login attempts, are logged and monitored.
Virtual Private Network (VPN) – Create a virtual tunnel across a public network that allows remote users to access resources on a private network.
Web Content Filtering - Scans content of every accepted web page. The system administrator can specify banned content
that is objectionable and/or not work related. When the web content
filter scan detects banned content, it blocks the web page.
The Collabrance Technology Stack
Learn more about all of our comprehensive services we offer in our standardized and fully vetted technology stack.