MANAGED
SECURITY
SERVICES

Enterprise grade Cyber Security
solutions designed for small
to medium sized organizations.
90 Day Free Trial No risk commitment
Cancel anytime
Month to month contract

Schedule A Demo

Services Overview

Watch this short video to learn more about OSIbeyond’s Managed Security Services.

According to a Cisco Cybersecurity report, 31% of organizations have at some point have encountered cyber-attacks on their operations technology. The most common security threats faced by small and medium sized organizations include:

  • Phishing/Social Engineering Attacks
  • Data Breaches
  • Ransomware
  • Shadow IT
  • Single Factor Passwords
  • Insider Threats
  • IoT Attacks

Why You Need Managed Security Services?

In the past Cyber Security was always thought to be part of IT. Today that mindset has changed. Cyber Security is a part of business, and until all organizations start thinking of it from that perspective, they are at risk of a catastrophic security breach.

To start with, you must ask these three questions:

  1. What is your organization doing about Cyber Security?
  2. Are you aware of what is happening inside your technology ecosystem?
  3. What would be the cost of a security breach to your organization?

The fact is that security is beyond securing the perimeter, and small to medium sized organizations are as much of a target as large corporations.

OSIbeyond’s Managed Security Services are based on the National Institute of Standards & Technology (NIST) Cyber Security Framework (CSF). The NIST CSF is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk.

OSIbeyond’s Managed Security Services includes the key components of the NIST CSF that are most relevant to your organization. In addition, the NIST CSF provides a foundation for compliance with other requirements such as PCI DSS, HIPAA, SOC1/SOC2 etc. Finally, the NIST CSF also meets common requirements from cyber security insurance providers, business partners/customers, and financial auditors.

The OSIbeyond Managed Security Services are offered in two packages. The basic CS1 package is ideal for organizations looking to start their cyber security program. The comprehensive CS2 package is ideal for organizations with requirements for a robust cyber security program. In addition, individual features from the CS2 package can be added to the CS1 package a la carte.

Developing a cyber security program requires extensive resources, expertise, costs, and time.
OSIbeyond’s Managed Security Services are an out of the box, plug and play solution designed to provide your organization with a sophisticated cyber security program. Managed Security Services from OSIbeyond provide immediate benefits including:

  • Protecting member/Customer Data
  • Meeting Board of Directors Expectations
  • Protecting Brand Reputation
  • Protecting Trade Secrets/Sensitive Data
  • Meeting Regulatory Compliance Requirements
  • Meeting Financial Audit Requirements
  • Meeting Cybersecurity Insurance Requirements

In addition, managed security services work in partnership with your existing in-house IT or managed service provider. With the objective of having an independent 3rd party providing checks and balances.

24x7 SOC Coverage

  • Monitoring of data from multiple systems
  • Human analysis of alerts to determine validity (identifying false positives)
  • Notification of verified threats for example:
    • Indications of active ransomware
    • Suspicious remote-control session
    • Malicious file being downloaded
    • Indication of email account compromises (forwarding rules etc.)
  • Guidance on remediation of detected threats OR
    • Threat Mitigation (CS2 package only)
  • Leveraging intelligence from other organizations
  • Expert Cybersecurity professionals
  • Second set of eyes on your systems/network
  • Benefits of using a 24×7 SOC

SIEM Solution

  • Web-based monitoring application
  • Works with sensors placed inside your technology ecosystem (monitoring all traffic)
  • Real time reporting of any signs of threat activity found in the monitored network
  • Provides enhanced threat analysis
  • Detecting and investigating threats within log metadata
  • Store logs for compliance (30 days)
  • Seamless deployment for workstations (no software/agents etc.)
  • Lightweight agent on servers (DCs only)
  • Analysis of combined data from multiple sources
  • Comprehensive visual on security posture

Office 365 Monitoring

  • Analysis of Office 365 logs and ingestion into the SIEM platform
  • Defend against business email compromise (BEC), account takeovers, and have visibility beyond network traffic.
  • Analyzing data from 365 in conjunction with other network assets

Dark Web Monitoring

  • Personal information can be stolen and purchased on the Dark Web, such as login credentials (username, password, emails etc.)
  • Employee may use work email address on personal websites (LinkedIn, Shopping, Newsletters, etc.)
  • When a password is re-used, one breached account can turn into many
  • If an employee’s personal account is breached, your business is also at risk
  • All it takes is one employee to cause a data breach
  • We monitor employee work email addresses on the Dark Web
  • Alert if breached accounts are found

Multi-Factor Authentication

  • Provides second layer of security
  • Prevents account compromise even if user password is stolen
  • Deployed on all compatible applications, for example:
    • VPN
    • Email
    • Cloud based services (Dropbox, OneDrive etc.)
  • Mobile app or token devices

Security Awareness Training

  • Randomized simulated phishing tests
  • Intended to catch users off guard
  • Conducted continuously
  • Includes training content such as for new hire orientation, annual refresher training etc.
  • Designed to decrease social engineering fraud

Advanced Email Filtering

  • Sophisticated algorithm detects and prevents phishing/spam threats
  • Focuses on CEO Impersonation/ Fraud attacks
  • Monitors outbound email to build profile of trusted contacts within the organization

Advanced Endpoint Protection

  • Next-Generation Antivirus Solution
  • Uses AI algorithm to detect and prevent threats
  • Able to isolate infection systems immediately
  • In the event of infection, provides rollback capability, for example:
    • Restoring infect system back to previously good state

Endpoint Encryption

  • Centrally managed encryption of storage on workstations (PC & Mac)
  • Protects data in the event of stolen or lost device
  • Common Cyber Security configuration requirement (audits/insurance etc.)

Vulnerability Assessments

  • Conducted biannually
  • Agentless scanning of network subnets
  • Identifying the most relevant threats to your environment
  • Remediation tracking and guidance for your IT staff
  • Fulfillment of audit/insurance requirements (historical record)
  • Scanning based on compliance requirements
  • Scanning of 3rd party hosted applications

WAF/DNS Protection

  • Protects public facing web sites/applications against malicious attacks
  • Provides filtering of inbound connection requests for example:
    • Mitigate denial of service attacks
    • Prevent Customer Data Breach
    • Prevent malicious bots from abusing site or application

Device Configuration Backups

  • Automated backups of supported network devices, for example:
    • Firewalls
    • Switches
    • Routers
  • If device is compromised, allows for rapid restoration of validated configuration
  • Provides change control/documentation of device configuration changes

Executive Summary Reports

  • Monthly Executive Summary Reports
    • Identified Threats
    • Remediation actions taken
    • Recommendations and guidance
  • Monthly Status Calls

PRICING

Please enter the number of users in your organization to obtain exact pricing. You can also hover over each item to read the description of that service. The CS1 package can be further customized by selecting additional items not included in that package.

24x7 SOC Coverage

  • Monitoring of data from multiple systems
  • Human analysis of alerts to determine validity (identifying false positives)
  • Notification of verified threats for example:
    • Indications of active ransomware
    • Suspicious remote-control session
    • Malicious file being downloaded
    • Indication of email account compromises (forwarding rules etc.)
  • Guidance on remediation of detected threats OR
    • Threat Mitigation (CS2 package only)
  • Leveraging intelligence from other organizations
  • Expert Cybersecurity professionals
  • Second set of eyes on your systems/network
  • Benefits of using a 24×7 SOC

SIEM Solution

  • Web-based monitoring application
  • Works with sensors placed inside your technology ecosystem (monitoring all traffic)
  • Real time reporting of any signs of threat activity found in the monitored network
  • Provides enhanced threat analysis
  • Detecting and investigating threats within log metadata
  • Store logs for compliance (30 days)
  • Seamless deployment for workstations (no software/agents etc.)
  • Lightweight agent on servers (DCs only)
  • Analysis of combined data from multiple sources
  • Comprehensive visual on security posture

Office 365 Monitoring

  • Analysis of Office 365 logs and ingestion into the SIEM platform
  • Defend against business email compromise (BEC), account takeovers, and have visibility beyond network traffic.
  • Analyzing data from 365 in conjunction with other network assets

Dark Web Monitoring

  • Personal information can be stolen and purchased on the Dark Web, such as login credentials (username, password, emails etc.)
  • Employee may use work email address on personal websites (LinkedIn, Shopping, Newsletters, etc.)
  • When a password is re-used, one breached account can turn into many
  • If an employee’s personal account is breached, your business is also at risk
  • All it takes is one employee to cause a data breach
  • We monitor employee work email addresses on the Dark Web
  • Alert if breached accounts are found

Multi-Factor Authentication

  • Provides second layer of security
  • Prevents account compromise even if user password is stolen
  • Deployed on all compatible applications, for example:
    • VPN
    • Email
    • Cloud based services (Dropbox, OneDrive etc.)
  • Mobile app or token devices

Security Awareness Training

  • Randomized simulated phishing tests
  • Intended to catch users off guard
  • Conducted continuously
  • Includes training content such as for new hire orientation, annual refresher training etc.
  • Designed to decrease social engineering fraud

Advanced Email Filtering

  • Sophisticated algorithm detects and prevents phishing/spam threats
  • Focuses on CEO Impersonation/ Fraud attacks
  • Monitors outbound email to build profile of trusted contacts within the organization

Advanced Endpoint Protection

  • Next-Generation Antivirus Solution
  • Uses AI algorithm to detect and prevent threats
  • Able to isolate infection systems immediately
  • In the event of infection, provides rollback capability, for example:
    • Restoring infect system back to previously good state

Endpoint Encryption

  • Centrally managed encryption of storage on workstations (PC & Mac)
  • Protects data in the event of stolen or lost device
  • Common Cyber Security configuration requirement (audits/insurance etc.)

Vulnerability Assessments

  • Conducted biannually
  • Agentless scanning of network subnets
  • Identifying the most relevant threats to your environment
  • Remediation tracking and guidance for your IT staff
  • Fulfillment of audit/insurance requirements (historical record)
  • Scanning based on compliance requirements
  • Scanning of 3rd party hosted applications

WAF/DNS Protection

  • Protects public facing web sites/applications against malicious attacks
  • Provides filtering of inbound connection requests for example:
    • Mitigate denial of service attacks
    • Prevent Customer Data Breach
    • Prevent malicious bots from abusing site or application

Device Configuration Backups

  • Automated backups of supported network devices, for example:
    • Firewalls
    • Switches
    • Routers
  • If device is compromised, allows for rapid restoration of validated configuration
  • Provides change control/documentation of device configuration changes

Executive Summary Reports

  • Monthly Executive Summary Reports
    • Identified Threats
    • Remediation actions taken
    • Recommendations and guidance
  • Monthly Status Calls

How many users?

CS1 PACKAGE
(Essentials)

$35p/m

CS2 PACKAGE
(Compliance)

$50p/m
24x7 SOC Coverage
SIEM Solution
Office 365 Monitoring
Dark Web Monitoring
Multi-Factor Authentication
Security Awareness Training
Advanced Email Filtering
Advanced Endpoint Protection
Endpoint Encryption
Vulnerability Assessments
WAF/DNS Protection
Device Configuration Backups
Executive Summary Reports

90 DAYFREE TRIAL

  • No risk commitment
  • Cancel anytime
  • Month to month contract
SCHEDULE A DEMO GET STARTED

Ready to talk?

Just provide your contact information and submit your request.