Page 5 - Catalog 2025 HTML Only
P. 5
Managed Security Services
Everything you see here are products we also use. We support what we sell and back them up.
IT Service Pros partners with industry leading companies in order to bring proven hardware and software
components together to form a multi-layered defensive wall between your business operations and the
world of dedicated intruders.
Most hackers target unprotected systems first and tend to move on to other opportunities if they come
up against a solid defensive perimeter. While no system is ever 100% guaranteed to be hack-proof, there
are methods and procedures which limit exposure to these incidents and allow rapid recovery in the
event of an infection, intrusion or other compromise.
We build a defensive configuration starting at the end-user level, moving through the network firewall
and out to the Internet Domain/site level.
And finally, we offer business policy template documents from the SANS Institute to help you establish
Acceptable Use Policy, Password Policy, Data Retention Policy and a large number of others free of
charge. Pro-active policies are required if you apply for a Cyber Insurance policy.
So, let’s take a look at some of these components and how they work together to defend your business.
Network Security Configuration
Good…
We require a minimum default multi-level defense structure in all our networks to protect your
operations. Beginning at the end-user workstation through to the Server, Internet Gateway device and
out to the Cloud, this configuration has proven highly effective in preventing intrusions and
compromises.
Better…
Combine the Good list with Datto Endpoint Detection and Response (EDR) which moves ahead of the
default antivirus product by being able to respond 24/7 to emerging threats
Best…
We now offer enhanced security features which provide Zero Trust Access to your network via
Cytracom’s Control One device. Once installed, it will not allow any access to the network assets except

