Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 102
ID Title Type Of Article
993 
5 things customers want from their salesperson Sales and Marketing
778 
TPM Installed on Cheetah requires correct BIOS Version How To
730 
Parallels Connection Mode Change How To
728 
Cell Phone Policy for Conference Rooms and Meetings Company Policy
723 
Office 365 Appointment Feature Meeting Poll How To
722 
Managed Services Program Descriptions - Elite, Live, Guard How To
712 
Windows 10 multiple display - windows are moved and resized on display power cycle or sleep Support
694 
QuickBooks Stop from retaining Last Logged-In User on Startup of QuickBooks How To
687 
Fix for Error Call to GetCustomUI() for RibbonID "Microsoft.Excel.Workbook in Engage OLE" Support
675 
Browser Emulation Settings in the Registry allows IE version for specific applications How To
671 
Use Eversign with Engage for Digital Signatures on Quotes, Work Orders, Invoices and More How To
660 
3CX Client How to setup Auto Status Change on Workstation Idle How To
649 
Engage Online Portal Export Reports to Excel How To
643 
How To Find PC Name How To
599 
Consumption Marketing a function Consumption Economics: The New Rules of Marketing Case Study
598 
Dynamic Resource Allocation Strategy Workforce Management Case Study
597 
Hyper-Converged Threat Initiative IT Security Strategy Case Study
596 
Cyber Security and My Cloud Applications: Am I safe? Case Study
595 
What value does Data-Tech bring to a Cloud Provider Partnership? Case Study
594 
The solution was extremely reliable and the process couldn’t be simpler. Case Study
593 
Emergency Services Turn to 3CX Voice Over IP Phone System after Hurricane Strikes Case Study
592 
Kaseya VSA Over Other Tools What it Means for Our Clients Case Study
591 
Data-Tech Chooses Kaseya Over Major Competitor After Three Month Evaluation Case Study
590 
Tew and Associates Migration to Managed Services and Cloud Solution Case Study
589 
Why is Data-Tech unique in an industry full of technology service providers? Case Study
Add New  Records per page  2 of 5   
Engage Knowledge Base Web View         Case Study          Print
Title Hyper-Converged Threat Initiative IT Security Strategy      
Resolution
Hyper-Converged Threat Initiative IT Security Strategy
 
 The Cyber landscape is changing, technology is evolving faster than protection and the global evolution of digital data is upon us. The threat of cyber-incursion is real and inevitable. An effective cyber-threat defense is not achieved with just hardware or software. Successful defense of your data against cyber-threats is realized through a strategy of leveraging multiple security technologies into an integrated solution.
 
"Guardian" is Data-Tech's Cyber-Threat Defense Initiative; a strategic combination of hyper-converged, cutting-edge hardware, software, management and automation. Purpose Built by Data-Tech's CyberCATs team of engineers to provide an intelligent and adaptive IT security ecosystem.   Unlike standard SIEM's, Guardian not only monitors, collects and reports on System Events but using the "Actionable Intelligence", Guardian takes immediate  automated corrective action.
 
Data-Tech's end-to-end security suite covers every aspect of information technology regardless of the endpoint. The integrated Hyper-Converged architecture produces a complete Cyber Defense Strategy. *SIEM - is an approach to security management that seeks to provide a holistic view of an organization's information technology (IT) security.
 
 
Hyper-Converged Threat Initiative
The core of Data-Tech's Hyper-Converged Threat Defense Initiative is the Guardian Security Suite. Partnering with the industry's leading IT security specialists to create a true End- to-End active cyber-threat defense strategy, Guardian TDI is the culmination of the CyberCATs' mission to create a cyber-threat defense ecosystem that fully protects our clients from cyber criminals around the clock.
 
There's more to enterprise security than defending perimeters. We believe that an IT security strategy aligned to the specific needs of your business is essential to future growth and innovation. Our solutions help you:
    • Protect your whole enterprise, inside and out, efficiently and proactively
    • Comply with internal governance policies and external regulations
    • Enable the adoption of new applications and technology
    • Proactively Monitor, Log, Report and Automatically Protect the IT Infrastructure
 
The Guardian Platform creates and maintains a strong security foundation with interconnected solutions that spans the enterprise. From the endpoint to the data center and on to the cloud, Guardian TDI mitigates the risk and reduces complexity so you can move your business forward with full confidence in your security.
 
Perimeter Security Appliance
IT Security starts at the perimeter of the network with intelligent Security Appliances that automatically evolve to protect, grow and learn with your business.  Data-Tech's perimeter or "Edge" Security is provided by redundant NSA 5600 Security Appliances. SonicWALL's top Next Generation security appliances. (See detailed security specs here NSA5600)  NSA 5600 Short Description and Features:
 
Centralized security and control
The SonicWallT Network Security Appliance (NSA) 5600 Next-Generation Firewall (NGFW) consolidates intrusion prevention; gateway anti-virus and anti-spyware; network-based malware protection; and application intelligence and control. You can also add bandwidth management; application blocking; and connectivity and security capabilities such as a multi-engine sandbox (Capture APT), SSL VPN, IPSec VPN, content filtering, anti-virus, and anti-spam.
 
Protection against emerging threats
We safeguard our Data-Center and your Data around the clock with the sophisticated security capabilities of NSA 5600 firewall. The RFDPIT engine inspects every byte of every packet and scans all network traffic-regardless of port or protocol. Real-time SSL decryption and inspection enables you to visualize and control application traffic as it crosses the network, and the NSA 5600 firewall has access to a continually updated cloud database that has more than 12.6 million variants of malware to protect your organization from emerging threats.
 
 
Enhanced Next Generation End Point Security
With the changes in today's technology landscape and so many ways to access data, no matter how good your Perimeter Security is, the possibility that a door is left open or the "Vampire" is invited in. is a very real threat that needs to be considered and made a critical part of your Cyber Security Strategy.
 
Threats such as potential poison Email, contaminated USB, phishing emails or a foreign object on the network are potential threats which are already inside the network. Advanced End Point Security will isolate any perceived threat, alert the security team and start Automated Protection and Repair processes.  
 
Guardian's Next Generation Endpoint Security is powered by Sophos EEPS. Sophos Enhanced Endpoint Protection System doesn't rely on signatures to catch malware, which means it catches zero-day threats without protecting you before those exploits even arrive.  (See detailed information on Sophos EEPS here)
 
True Threat Prevention can't wait for Human Input.  Whether from the perimeter or end point, a system like Guardian that supports "Actionable Intelligence" enables the immediate Automated Response taking corrective action to protect your network, data and system users without human intervention.  - Chris Lietz
 
Guardian Enhanced Endpoint Security Enterprise Suite includes more than advanced threat prevention of your End Points. The Enterprise Suite Offers enterprise-class device and data encryption,  authentication with a central point of control which is particularly important for Mobile Devices such as Notebooks, Tablets and Smartphones. This revolutionary advanced threat prevention offers unparalleled efficacy against zero-day threats, advanced persistent threats, ransomware and commodity malware. In fact, testing shows that our protection is 99% effective versus an average of only 50% for traditional anti-virus protection such as Symantec.
 
Guardian Encryption Features
Protect information on any device and in the cloud with data-centric endpoint encryption. Centrally manage mixed IT environments with Guardian Premium, which includes our server-based data security console for administration, programmable triggers, audits, reports, compliance certificates and logs.
 
The Guardian Management System is a single, configurable, web-based management tool allowing you or your IT Partner to remotely secure and manage the vulnerable mobile devices in your organization, including those devices owned by employees. Built for iPhone and iPads, Android phones and tablets, Windows and Mac PCs, and USB storage, Guardian Core modules can be added instantaneously to your account/web console as you need them.
 
Designed to be easy enough for an IT staff of one to deploy and manage, and transparent to users to promote maximum employee productivity, this innovative approach to device security dispels the reputation earned by other products on the market. And because it's a service, the system can grow incrementally as you add more and different devices.
 
 
 
Basic Encryption Features Included:
    • Customizable reporting of status and device risks/conditions
    • Remote enforcement of password and security policy
    • Full encryption of all sensitive data on the devices
    • Immediate data access elimination with instant, administrator-enabled remote restoration
    • Complete data wipe capability when devices are stolen
    • Broad range of both administrator-enabled and automatic security responses to threat conditions
 
Guardian Enterprise Mobility Management (EMM)
A Cyber Security Threat Protection Strategy is not complete without securing Mobile Devices. Until recently there was tremendous complexity in mobile devices particularly for the BYOD segment of business.  ** BYOD or "Bring Your Own Device" refers to End Users using their personal devices such as Smart Phones, Tablets and personal Notebooks to access company systems and information.  
 
Mobile Device Management (MDM) and BYOD integration in a secure corporate environment are integral components of the Cyber Defense Strategy.  The complexity of MDM and BYOD has left many business enterprises exposed to cyber-threats.  Reference "Cloud Computing: Am I Safe?"  
 
Every organization needs to Manage and Secure mobile devices that access the network and data. Secure mobility management is a core element of the Guardian TDI project for the CyberCATs.  Partnering with Sophos, the CyberCATs have created a pure cloud security solution that is compliant and secure, yet flexible enough to embrace corporate BYOD needs.  
 
Enable greater user productivity and business agility with secure mobility solutions that protect networks, devices and data - all while enhancing the end-user experience. We've designed our comprehensive, integrated mobility solutions to deploy, secure and support smartphones & tablets.
 
    • Protect the network, devices and data, end-to-end, while reducing complexity and risk
    • Eliminate silos by sharing intelligence between key mobile security functions
    • Remove barriers to mobile usage for end users, with transparent security and ease of use
    • Centrally manage mobile devices and provide a unified console for smartphones and tablets with centralized policy and control across multiple platforms.
    • Mobility Intelligence dashboards deliver an interactive, graphical summary of your operations and compliance, allowing IT to report in real-time across the entire enterprise.
    • Diagnose and resolve device, user or app issues in real time.
    • Proactively secure mobile devices with dynamic security and compliance features: Continuously monitor devices and take action.
    • Rapidly enroll mobile devices: MDM streamlines the platform set-up and device enrollment process to make life simple for IT and employees.
 
 
Guardian End-Point Management & Security System (EMSS)
While there are numerous systems that provide support roles in Guardian's Security Suite none are more important than End-Point Management & Security Systems built on the World Leader in EMS / RMM technologies, Kaseya. Data-Tech is proud to promote Kaseya as the platform our EMSS is built on.
 
For Data-Tech End-Point Management goes beyond just security patching, system updates and SIEM (System Information & Event Management). The CyberCATs mission is to provide completely automated environment gathering and acting on "Actionable Intelligence" where systems are in a state of constant predictive analysis automatically protected, repaired and reported on.
 
The CyberCATs Security Team of Certified Engineers has developed highly customized enhancements to the core functionality of Kaseya, Sophos, Rapid-fire Tools and more.  Building on the core functionality of these security tools the CyberCATs developed a series of Hyper-Converged Cross Platform products and services call the Versa-Bots.
 
Versa-Bots are a growing and evolving collection of enhanced Maintenance, Management, Security Programs and Processes custom designed and developed by the CyberCATs.  Centrally Managed by Versa Prime, these programs work together to allow the Hyper-Converged Architecture of Guardian to communicate and carry out the Automated Protection across the Cyber Security Ecosystem.
 
Introduction to the Versa-Bots
Versa-Bots are continuously monitoring your systems for any errors or potential security risks and reporting back to Prime to schedule corrective action. Some of the Versa-Bots are idle unless needed to perform a service so they don't interrupt your work productivity. Specific routines are scheduled for nights, weekends or detected system idle time to perform their tasks.  The Versa-Bots communicate and will share information on discovery so the appropriate task can be completed by the assigned Versa-Bot.
 
 Versa Prime
Prime is the centralized Command-Bot control center in the cloud. Prime manages all the Versa-Bots and keeps them on task.  All Versa-Bots report back so Prime is always up to date on the status of thousands of end points individually managed by Primes Versa-Bots.  During work hours Versa Primes directives are to protect and monitor your computer system in real time.  When you're not work Primes directives the Versa-Bots are to clean and optimize your system to maintain optimal performance.
 
 Guardian - (the Original Versa-Bot where it all started)
Let me introduce you to one of our protection Versa-Bots. This guardian Versa-Bot is a creation from our CyberCATs division of elite IT engineers. Guardian runs around your computer protecting you from viruses and malware that may try to infect your system. Guardian is active 24x7 and is always protecting you.
 
 
 Timmy
Timmy is our maintenance Versa-Bot. Timmy keeps your computer clean, removing junk and old files every night. As you use your computer it fills up with temporary files that slow it down. Timmy is programmed to find these files and get rid of them so your computer runs efficiently.
 
 Cagen
Our most sophisticated Versa-Bot is Cagen.  A full time resource monitor that keeps a watchful eye on your computer resources like hard disk space, memory, and processor. He also looks for errors and problems with your computer. In some cases, Cagen can automatically fix the issues, or alert a Data-Tech engineer to address the problem.
 
Sentinel
 Sentinel is our "self-healing" A.I agent utilizing Shadow Repair technology that allows servers and workstations to repair themselves. Our next generation Sentinel agent responds in real time to unauthorized changes that might put your system at risk. Restore any device in your enterprise back to optimal conditions on demand, or automatically. Sentinel doesn't just report a problem; it fixes it without costly technician intervention.
 
Synergy
 Keeping security and applications updated is Synergy's primary task. Synergy communicates with Microsoft and other key application providers to download and automatically apply updates and security patches to your computer and its applications.
 
 
Metro
 Extending support to remote locations is Metro's job. Metro is always running in the background waiting for remote support technician commands. Metro can execute commands completely in the background so the user activity is not interrupted or allow the remote agent to completely take over the device to effect efficient repairs.
 
 
Ziggy
 Auditing and reporting is Ziggy's primary function. Ziggy is Timmy's little brother, when Timmy finishes gathering all the information about your computer he sends it to Ziggy. Accounting, HR, CEO's, and IT managers love Ziggy because they get a detailed picture of their entire IT enterprise. With Ziggy's information, compliance and regulation are just a click away. Ziggy can be programmed to send scheduled reports to your accounting and HR team keeping them up to date on assets and user productivity within your organization.
 
 
 
Speckles
 Last but certainly not least, we have our monitoring bot, Speckles! Speckles will monitor your network 24 hours a day, 7 days a week, 365 days a year! He's always on the prowl looking for new additions to your network! When he finds new devices, he can be programmed to automatically deploy a Managed Service agent so all the other Versa Bots can do their jobs! Even if he's not programmed to deploy agents, he will let the Data Tech team know that new devices were found.
Please visit our website for a complete list of Versa-Bots and meet the rest of the team.
 
So how do we manage all of this?
 
Sophos Central Management Web-Based Dashboard enables Data-Tech's Security Team to collectively manage Monitor, Manage and Control the various complex layers that encompass the Guardian Threat Prevention Strategy.
 
 
Terminology
* Hyper-convergence (hyper convergence) is a type of infrastructure system with a software-centric architecture that tightly integrates computer, storage, networking and virtualization resources as well as additional technologies from scratch in a commodity hardware box supported by a single vendor.
*Guardian is one of our protection Versa-Bots created by our CyberCATS division of elite IT engineers. Guardian is working 24 x 7 to protect you from viruses and malware that may try to infect your system. Guardian is evolving, and is now part of the Hyper-Converged Cyber-Threat Defense Initiative.  
 
*BYOD - Bring Your Own Device refers to when employees use their personal devices to access company data.  This can be as simple as corporate email, but often includes accessing the company's cloud applications and the corporate Wi-Fi network.
 
*MDM - Mobile Device Management refers to the management and security of mobile corporate assets (which often includes BYOD). Potential devices include cell phones, tablets, notebooks as well as IoT devices.
 
*IoT - refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems.
Vendor *
Web Link
Date Entered 4/3/2019
You Tube Link
Type Of Article Case Study
Article ID 597


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.