A comprehensive security plan
Sourcing the right cyber and IP assurance, system monitoring and intrusion protection to defend your organisation.
Including proactively monitoring and enhancing your Secure Score, and actively responding to alerts.
Deploying internal network monitoring and user activity monitoring, so you know exactly who is accessing your systems.
External penetration testing
Stress testing your systems and ensuring they are robust enough to repel attacks.
A rapid-response service should a successful breach occur, with urgent on-site assistance.
Helping to ensure your cyber security strategy is GDPR and industry compliant.
Next-generation firewalls send alerts when: viruses are intercepted; there is an network intrusion attempt; and even when sensitive information gets sent outside the organisation.
We manage your antivirus of choice or install our recommended solution. Alerts are directed to the SOC desk and issues identified and dealt with before they can spread.
Best-in-class email filtering will block email malware, spam and phishing emails.
Threat detection and incident response with SIEM
We use the latest cyber security AI such as Microsoft Sentinel to help us spot, investigate and deal with security risks before they can actually do any damage.
Annual security hardening roadmap
At the start of our engagement, an Intersys strategic consultant will work with your IT team to identify areas in need of hardening and put together a plan to strengthen your network and protect your data.
Intersys works with Acronis to provide best-in-class backup from Microsoft 365 to ensure that your emails and files stored in the cloud are safe from any errors or accidental deletion.
Zero trust / application whitelisting and ringfencing
We will lock down your computers to ensure that only pre-approved applications can run. This means it is almost impossible for a virus or ransomware to run on one of these machines.
Privilege Access Management (PAM)
Additional administrative permissions can be a weak link in your company’s IT security. However, some software or job roles require this to function properly. PAM allows administrative access on request, so users can work effectively without compromising your network.
Cyber Essentials Certification
We will work with your team to help you achieve Cyber Essentials Certification. We manage the process and assist with the steps needed to become compliant.
Endpoint sensor / compliance monitor
We install specialised software on each computer that scans the device software, checks the version and identifies any vulnerabilities or sensitive information such as passwords and credit card details. Intersys staff will identify the most at-risk computers and work with your team to rectify any issues found.
We set up automatic vulnerability scans for your network perimeters and OWASP scans for your website to look for vulnerabilities. Our team will review the findings with you and advise on steps to remediate any issues found.
Our dark web service scans hacker forums and databases looking for references to your users’ information. As soon as information about your organisation is found on the dark web, we will work with your team to ensure the accounts are secured and no longer at risk.
Security specialist consultancy
Our security specialists can undertake hardening projects for your network, either working with your IT team or managing the project themselves.
Get granular control over your devices wherever they are in the world. We provide unified control over all network traffic using web and DNS filtering, so traffic on all machines is reviewed before it hits the endpoint.
Online cyber security training
Your staff will have access to a customised training portal with over 50 cyber security training modules they can complete at their leisure. You can even assign different courses to your specialist staff, to ensure they have the relevant training. Each course consists of a short video followed by a multiple-choice quiz.
To ensure your staff can spot suspicious emails, our team will simulate phishing attacks. We can monitor staff that have clicked on these bogus links and entered in credentials. This approach can be integrated with cyber security training to ensure staff vulnerable to attacks receive extra attention – and ALL of your staff can spot a malicious email.
Regular security meetings
Our SOC specialists will meet with your staff on a regular basis (monthly for Gold packages and fortnightly for Titanium) to review SOC alerts, identify trends or weak points in the network, and advise on steps to make your network more secure.