© 2018 by MeriTec Services, Incorporated

  • LinkedIn Social Icon
  • Facebook

Proudly created with wix.com

Managed Solutions

Cybersecurity Solutions designed for every business size and need. Ensure your data has the security needed to meet even the most stringent compliance requirements. 

Designed for the DIY-minded business that prefers to handle their own Cybersecurity, but aren't sure where to start. This two-day session will give you, and your employees, the tools and knowledge you need to do it right. 

Designed for businesses that require essential protection, at an affordable price. The Essential plan provides you with the necessary technologies to combat 90% of cyber criminals that are seeking easy targets.

Designed for businesses that store sensitive client data, operate multiple sites, or require remote connectivity. The Advanced plan provides professional monitoring, a NexGen Firewall, and industry-leading EDR solutions.

Designed for businesses that require 24/7/365 professional monitoring using state of the art SIEM technologies. The Ultimate plan is designed to protect your business from the most sophisticated cyber criminals.

CYBER BOOTCAMP

ESSENTIAL

ADVANCED

ULTIMATE

 

CYBER BOOTCAMP

A two-day intensive Cybersecurity course designed to provide businesses the knowledge and skills required to manage their own Cybersecurity.

Day1:

Our experts will assess your current security posture, review your technology, evaluate your security related policies and procedures, and configure your security settings. 

Day 2:

Focused exclusively on training, we will train your employees on cyber threats, how to identify them, and how to respond. Additionally, we provide exclusive training for your executive staff on how to effectively manage technology, what services you actually need, and how to incorporate Cybersecurity into your culture.

Deliverables:

  1. Vulnerability Assessment: A detailed breakdown of your network, potential vulnerabilities, and recommendations to fix any issues.

  2. Technology Review: A detailed assessment of each device connected to your network and its susceptibility to attack. A technology inventory list detailing each piece of equipment on your network, its location, and a photo of each device. 

  3. Security Configurations: A thorough examination of your current security settings and recommended solutions to enhance them, including antivirus, antimalware, firewalls, and IDS/IPS. We will recommend technologies to further enhance your security, matching your needs and budget.

  4. Security Policies: Evaluate your current Cybersecurity related policies to provide recommended enhancements. Including new, tailored policies for any areas not currently covered.

  5. Employee Training: Train your employees to detect, react to, and mitigate common cyber threats. Teach them proper Cybersecurity techniques to keep your business secure.

  6. Executive Training: Guide your leaders through managing technology to combat cyber threats, specific threats facing your industry, and how to incorporate Cybersecurity into your existing culture.

ESSENTIAL SECURITY

A fully managed security solution designed to provide your business the Essential security needed to protect against the most prevalent threats. 

 

              Contract Free     |     5 employee minimum

Technology:

  • Vulnerability Assessment: A detailed breakdown of your network, potential vulnerabilities, and recommendations to fix any issues. Conducted quarterly.

  • Technology Review: A detailed assessment of each device connected to your network and its susceptibility to attack. A technology inventory list detailing each piece of equipment on your network, its location, and a photo of each device. A thorough examination of your current security settings and recommended solutions to enhance them, including antivirus, antimalware, firewalls, and IDS/IPS. We will recommend technologies to further enhance your security that match your needs and budget.

  • Patch Management: Maintenance of your equipment, operating systems, and applications to ensure the latest updates are applied on-time.

  • Antivirus/Antimalware: Purchase, install, and configure antivirus/antimalware software to protect your endpoints.

  • Backup Solutions: Purchase, install, and configure a backup solution to provide differential cloud-based backups, and external hard drive warm and cold backups.

  • Security Policies: Evaluate your current Cybersecurity related policies to provide recommended enhancements. Including new, tailored policies for any areas not currently covered.

 
 

ADVANCED SECURITY

A fully managed security solution designed to provide your business Advanced security features ideal for businesses that store sensitive data, operate multiple sites, or require remote connectivity.

 

Annual Contract    |     Includes Essential Services

Technology:

  • NexGen Firewall: A fully managed virtual firewall with 24/7 support, intrustion prevention, web contect filtering, application control, DNS protection, VPN, and file cloud sandboxing.

  • Employee Training: Quarterly in-person Cybersecurity training and on-demand access to an online suite of security training videos and exams. A complementary service to our Phishing Simulations.

  • Phishing Simulations: Deliver sophisticated and realistic phishing emails to your employees, intended to resemble real-world phishing attempts. An estimated 90% of sucessful attacks start with a phishing email. 

  • Email Security: Email security features to include real-time spam protection, antivirus detection, URL category filtering, IP sender reputation, behavioral analysis, active content dection, reporting.

  • Endpoint Encryption: A combination of malware protection and full-disk encryption installed at the user-level to offset human based attacks. 

  • Endpoint Detection and Response (EDR): Go beyond traditional antivirus to collect and analyze behavioral data on each endpoint to detect fileless attacks. EDR protects against malware, fileless attacks, misuse of applications, and malicious user behavior.

ULTIMATE SECURITY

A fully managed security solution designed for businesses that require the 24/7/365 continuous monitoring and incident response, designed to protect your business from the most sophisticated threats.  

 

Annual Contract    |     Includes Essential and Advanced services

Technology:

  • 24/7/365 Continuous Monitoring: Networks and endpoints are monitored 24/7/365 by a Security Operations Center (SOC), manned with the industries highest-trained analysts and engineers. 

  • SIEM Log Analysis: Security Information and Event Management (SIEM) analyzes the millions of activity logs generated by your network real-time to detect threats and suspicious activity in seconds.

  • Vulnerability Management: Go beyond quarterly vulnerability assessments and incorporate continuous vulnerability monitoring of your network to identify weaknesses and avoid zero-day threats.