cloudCENTRX CYBERSECURITY

Integrated & Intelligent Approach to Securing Your IT Environment

The cloudCENTRX objective is simple:

Cybersecurity for any business is not only about adding layers of security technology. It starts with understanding and managing a business’s cybersecurity risks. M-Theory helps businesses understand how to best identify and protect vital data and technology assets, and how to detect, respond to and recover from a cybersecurity incident.

Cybersecurity for any business is not only about adding layers of security technology. It starts with understanding and managing a business’s cybersecurity risks.

M-Theory helps businesses understand how to best identify and protect vital data and technology assets, and how to detect, respond to and recover from a cybersecurity incident.

The cloudCENTRX solution is complex:

Upon identification of risks, design a Remedy Action Plan, execute the plan and provide ongoing maintenance of new policies around data governance.

Upon identification of risks, design a Remedy Action Plan, execute the plan and provide ongoing maintenance of new policies around data governance.

ASSESSMENT

All businesses are concerned about cybersecurity breaches and how they would impair their image and customer trust. To understand the service level needed, M-Theory will help to assess what business assets need to be protected from cyber-attacks and where resiliency is needed.

ASSESSMENT

All businesses are concerned about cybersecurity breaches and how they would impair their image and customer trust. To understand the service level needed, M-Theory will help to assess what business assets need to be protected from cyber-attacks and where resiliency is needed.

cloudCENTRX delivers cybersecurity services through a recipe of policies, procedures, cutting-edge technology and most importantly, its people. When it comes to cybersecurity, there is one single objective; to secure and protect applications and data, no matter where they reside. cloudCENTRX assesses how enterprises store and serve data and identifies gaps in an organization’s compliance policies and protocols, then designs and delivers custom tailored solutions that secure and protect.

cloudCENTRX delivers cybersecurity services through a recipe of policies, procedures, cutting-edge technology and most importantly, its people. When it comes to cybersecurity, there is one single objective; to secure and protect applications and data, no matter where they reside.

cloudCENTRX assesses how enterprises store and serve data and identifies gaps in an organization’s compliance policies and protocols, then designs and delivers custom tailored solutions that secure and protect.

The onset of the cloud has created many new threats that businesses need to contemplate. There are 12 primary threats, known as the Treacherous 12 (published by the Cloud Security Alliance) that cloudCENTRX targets.

Data Breaches

Weak Identity, Credential & Access Management

Insecure Application Programming Interfaces (APIs)

System & Application Vulnerabilities

Data Breaches

Malicious Insiders

Advanced Persistent Threats (APTs)

Data Loss

 Insufficient Due Diligence

Abuse and Nefarious Use of Cloud Services

Denial of Service

Shared Technology Issues

cloudCENTRX defends and mitigates the Treacherous 12 by implementing a relatively simple means of responding to all the outlined cyber threats. To provide complete protection, cloudCENTRX will finalize the offering by delivering 24×7 monitoring, support and remediation services, ongoing maintenance of security policies, ongoing management, and constant maintenance and support.

The onset of the cloud has created many new threats that businesses need to contemplate. There are 12 primary threats, known as the Treacherous 12 (published by the Cloud Security Alliance) that cloudCENTRX targets.

Data Breaches

Weak Identity, Credential & Access Management

Insecure Application Programming Interfaces (APIs)

System & Application Vulnerabilities

Data Breaches

Malicious Insiders

Advanced Persistent Threats (APTs)

Data Loss

Insufficient Due Diligence

Abuse and Nefarious Use of Cloud Services

Denial of Service

Shared Technology Issues

cloudCENTRX defends and mitigates the Treacherous 12 by implementing a relatively simple means of responding to all the outlined cyber threats.

To provide complete protection, cloudCENTRX will finalize the offering by delivering 24×7 monitoring, support and remediation services, ongoing maintenance of security policies, ongoing management, and constant maintenance and support.

APPROACH

cloudCENTRX provides a two-week engagement, initiated with an agreed upon program goal and objective, followed by established benchmarks and targets. cloudCENTRX will conduct a series of interviews with various managers and create a full review of security policies. cloudCENTRX then implements toolsets to perform internal vulnerability scans, highlights outbound security deviations, searches for Personal Identifiable Information (PII), delivers a data breach liability report and creates a remedy action plan.

APPROACH

cloudCENTRX provides a two-week engagement, initiated with an agreed upon program goal and objective, followed by established benchmarks and targets. cloudCENTRX will conduct a series of interviews with various managers and create a full review of security policies.

cloudCENTRX then implements toolsets to perform internal vulnerability scans, highlights outbound security deviations, searches for Personal Identifiable Information (PII), delivers a data breach liability report and creates a remedy action plan.

Once the assessment is complete, cloudCENTRX provides the following deliverables:

  Security Report Card: the grading system shows a clear assessment of the client’s current security position.

  Security Risk Score: the score quantifies issues into measurable values that can be tracked over time.

  Security Risk Analysis Engine: an examination of the massive quantities of data, as it pertains to, best practices, violations and issues.

  Security Audit Log Analysis: the results of thousands of log entries across the network for anomalous and failed logins.

  Scan of Perimeter Defenses: ensures perimeter defenses are protecting properly with routine, external vulnerabilities scans.

  Firewall Analysis: verifies outbound firewall configuration to block unnecessary outbound traffic and filtering to reduce works and ransomware.

  Egress Filtering Review: finds lack of Egress Filtering (blocking outbound traffic). One of the most misconfigured firewall settings.

  Data Breach Liability Report: the report that monetizes a customer’s potential liability by scanning for personal data that can be compromised in a data breach.

Once reports are delivered, the cloudCENTRX team creates the remedy action plan and approves strategy with the customer. Upon executing the Remedy Action Plan, cloudCENTRX provides a comprehensive ongoing support and maintenance plan, ensuring improvements to security and established data governance.

Once reports are delivered, the cloudCENTRX team creates the remedy action plan and approves strategy with the customer.

Upon executing the Remedy Action Plan, cloudCENTRX provides a comprehensive ongoing support and maintenance plan, ensuring improvements to security and established data governance.

SERVICES & FEATURES

Managed Antivirus, Virus Removal and Repair

Powered by ESET, a leading private cybersecurity software company that unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. ESET has become the first IT security company to earn 100 Virus Bulletin VB100 awards, for identifying malware without interruption since 2003.

  • Managed antivirus
  • Endpoint protection
  • Mobile protection
  • DNS protection
  • Virtualization security
  • Virus removal & repair
  • Remote installation & managed services support included
Managed Firewall Services

Powered by Fortinet (NASDAQ: FTNT) a company secures the largest enterprise, service provider, and government organizations around the world. Fortinet’s architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments.

  • Managed Fortinet 30E security solution
  • Unified Threat Management (UTM)
  • Industry’s best threat protection performance & ultra-low latency
  • Extensive routing, switching, wireless controller & high-performance IPsec VPN capabilities to consolidate networking and security functionality
  • 360° visibility to identify issues quickly & intuitively
  • Onsite installation, monitoring services & managed services support included
Managed Secure Wireless Network Services

Powered by Fortinet (NASDAQ: FTNT), a leading global provider of network security appliances for carriers, data centers, enterprises and distributed offices to deliver the most innovative, highest-performing network security fabric to secure and simplify IT infrastructure.

  • Managed FortiAP 221E solution
  • Plug & play wireless access point
  • Advanced security protection
  • Built-in WiFi security
  • Unified management console: simplified operations, consistent and effective policy enforcement & compliance
  • Onsite installation, monitoring services & managed services support included
Managed Spam Protection & Email Encryption Services

Powered by Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity company that helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks.

  • Block & undo phishing attacks, spam, impostor email & all other malicious content
  • Email continuity
  • Email fraud defense
  • Email encryption
  • Email filtering: block spam & malware, outbound filtering for compliance, email continuity, targeted attack protection, & email archiving
  • Remote installation & managed services support included
Managed Online Backup & Recovery Services

Powered by CrashPlan, a leading backup services company that provides one of the few online backup services to offer unlimited storage space for business users. CrashPlan backup software offers the best way to back up and store business & enterprise data securely – offsite, onsite & online in the Cloud.

  • Managed online encrypted backup & unlimited online storage
  • Silent & continuous backup in real-time
  • External drive backup
  • Deleted file protection
  • Generous retention & versioning
  • Files backed up using AES-256 encryption (highest grade encryption)
  • Recovery services & managed services support included
Managed Dark Web Monitoring Services

Powered by ID Agent, a Dark Web monitoring and identity theft protection company delivering Dark Web intelligence to identify, analyze and monitor compromised or stolen employee and customer data for private and public sector organizations and for millions of individuals impacted by cyber incidents.

  • Managed dark Web ID solution
  • Dark Web threat alerts
  • Compromised data tracking, reporting, data trending & benchmarking
  • Supply chain threat monitoring for potential third-party threats
  • Customer management to better secure customers
24/7 Monitoring Service

Powered by CA Technologies (NASDAQ: CA), creating software that fuels transformation for companies and enables them to seize the opportunities of the application economy. CA Technologies in partnership with M-Theory optimize responsiveness and availability of the private cloud environments being managed, helping ensure the delivery of quality services that boost customer sales, satisfaction and retention.

 

  • Backed by complete, high-touch managed services
  • 24/7/365 support services, including monitoring, administration, network operations
  • Enhanced service levels, quicker detection and issue repair
  • Improved operational efficiency
  • Greater agility & adaptation to changing IT environments
  • Optimized business performance
Endpoint Detection & Response

Powered by SentinelOne, delivering autonomous endpoint protection through a single agent that successfully prevents, detects and responds to attacks across all major vectors. Designed to eliminate threats in real time for both on-premise and cloud environments; it is the only solution to provide full visibility across networks directly from the endpoint.

  • Covers as many threat vectors as possible
  • Dedicated malware scanner & active web scanning
  • Data Assurance Backup & Recovery Module
  • Cloud-based recruitment solution to protect HR
  • Efficient multilayered endpoint protection

PRICING

M-Theory group offers flexible pricing for cloudCENTRX Managed Cybersecurity Services. The price will depend on the number of services (multiple services offer a bundle discount) and the complexity of customization.

Powered by CapEx·as·a·Service™

CapEx-as-a-Service™ (CaaS™) transforms Capital Expenditures (CapEx) of enterprise hardware and software to a managed Operating Expense (OpEx) by delivering people, processes, and technology through a managed services model. For more detailed information visit CapEx-as-a-Service™ page.

PRICING

M-Theory group offers flexible pricing for cloudCENTRX Managed Cybersecurity Services. The price will depend on the number of services (multiple services offer a bundle discount) and the complexity of customization.

Powered by CapEx·as·a·Service™

CapEx-as-a-Service™ (CaaS™) transforms Capital Expenditures (CapEx) of enterprise hardware and software to a managed Operating Expense (OpEx) by delivering people, processes, and technology through a managed services model. For more detailed information visit CapEx-as-a-Service™ page.