Marco Technologies UnifyIT
Managed Cyber Security
IdentifyIT
3 bundles to choose from:
Assest Management
- Asset and network discovery, inventory, and documentation.
- Network performance monitoring and alerting.
- Automated operating system patch management and third-party application patching.
- Ability to automate script deployments to remediate critical vulnerabilities.
- Proactive alerts and reports with the ability to audit historical data with change management discovery.
- Asset lifecycle planning services
Compliance
- Human interviews and an automated tool for data collection to determine compliance with the NIST Cybersecurity Framework (CSF).
- Reporting and planning services to assist clients with NIST CSF compliance.
- Security awareness training.
- Simulated phishing platform to test employees with follow-up reinforcement training.
Vulnerability
- Asset discovery and analysis to identify known vulnerabilities.
- Track vulnerability and assess risk with risk scores.
- Identify and report on missing patches, updates, non-approved software installs, and other vulnerabilities.
DefentIT
3 bundles to choose from:
Web & Domain Name System Security
- Stop threats before users can access them with DNS layer security.
- Web security with category content filtering.
- Flexible protection on and off the network for devices and users.
- Cloud-based malware prevention.
Email Security
- Email encryption portal to stop data leaks of sensitive data.
- AI-based threat detection and anti-phishing protection to stop fraudulent emails from reaching users.
- Advanced Threat Protection (ATP) cloud-based security to protect against spam/malware.
Multi-Factor Authentication
- Streamlined login experience for easy use.
- Deploy in any environment to protect any application on any device.
- Easy-to-use, secure mobile app to verify identity in seconds.
SecureIT
2 bundles to choose from:
EDR & SIEM
- Collect, store and analyze events and logs for your organization for indications of compromise and identify potential undetected issues.
- Security Operations Center (SOC) experts use cloud-scale data, tools and up-to-the-minute threat intelligence to hunt for threats.
- Advanced persistent threat protection with Machine Learning, known indicators of compromise and advanced analytics.
- Artificial Intelligence and human-based threat hunting to find and stop otherwise undetected threats.
- Unified technologies to successfully stop breaches, including next-gen antivirus and anti-malware, Endpoint Detection and Response (EDR), threat hunting, and threat intelligence automation.
Threat Intelligence: Instrusion Detection System (IDS)
- Reduce noise and false positives with our SOC as first-tier triage before your team takes the reins; or rely on our certified, experienced, threat analysts with on-demand services.
- Full threat visibility into every single network packet with threat intel and alerts – Intrusion Detection System (IDS).
RestoreIT
2 bundles to choose from:
Backup
- Reporting of backup status, health monitoring, and storage.
- Off-site backup replication.
- Hardware- and software-based backup for your critical information.
Disaster Recovery
- Disaster recovery plan maintenance and testing.
- Near real-time system duplication to protect against an event (disaster, security, outage).