resilient

SecuraPro™ Resilient

The SecuraPro™ Resilient solution is aimed at larger organisations where a robust and complete managed security service is required.

Find out why we're trusted

The Resilient package is built on the strong foundations of SecuraProᵀᴹ Essential and Assured solutions but is tailored and fully customised to meet each organisation’s specific needs.

Designed for businesses with 100 to 250 employees, key features of the Resilient solution include
24/7 Security Incident and Event Management (SIEM), advanced technology controls, mobile device management, dark web and cloud monitoring.

Key Features

  • The ability to detect threats in real time with insider threat management solutions to investigate incidents and respond to them
  • Encryption tools that prevent hackers from accessing your email communications
  • Dark web monitoring to limit reputational damage following a third party breach, cyber attack or security compromise
  • Business Continuity and Disaster Recovery Plans including the backup of data, virtual machines (VMs), endpoints and cloud/SaaS (Office365 and Google Cloud)
  • Management, monitoring and performance assessment of cloud computing architecture, infrastructure, services and applications, making sure that users and customers can use the framework to its full potential
  • Mobile endpoint encryption – working across all of your organisation’s endpoints while protecting employee privacy
  • Encrypting data thereby reducing the number of people who can read it – only someone with a secret key or password, not a hacker
  • MDR / SIEM – Managed Detection and Response/Security Incident and Event Management – is a big step in the right direction towards improving your security posture while reducing risk exposure by monitoring in real time systems and network equipment for anomalous activity

Elements

Element

Essential

Assured

Resilient

ONGOING GUIDANCE & SUPPORT FROM OCTREE

Access to a Cyber Security Consultant

FOUNDATIONAL ELEMENTS (POLICIES & PROCEDURES)

Asset Discovery and documentation

Cyber security policy

Data Protection Policy (Privacy Statement)

Acceptable Use Policy

Vulnerability assessment and management

Alerting and reporting

BC/DR Plans (Business Continuity & Disaster Recovery)

System hardening with baseline policies

SHIFTING CULTURE THROUGH TRAINING

Cybsafe security awareness training

Oninbox messaging awareness training

Threat knowledge journal

Technology (Infrastructure)

Password management

Auditing Discovery

MDR/SIEM

Technology (Messaging)

Secure email gateway

Email impersonation Defence (SPF/DKIM/DMARC)

Email encryption

Technology (BC/DR)

Backup - data

Backup – virtual machines (VMs)

Backup - endpoints

Backup - cloud / SaaS (Office365, Google Cloud)

Technology (Web)

Web domain name system (DNS) filtering

Web content filtering

Dark web monitoring

Cloud monitoring

Cloud Access Security Broker (CASB)

Technology (Devices)

Endpoint protection (EDR/XDR)

Mobile endpoint protection

Mobile device management

Technology (Data)

Data encryption

Essential
Assured
Resilient