INTRODUCTION TO MANAGED CYBER RESILIENCE SERVICE

Our Premium, Affordable and Proactive Monthly Subscription 'Fully Managed, So You Don't Have To' All-in-One Cloud-based Mitigation Solution, which Manages, Monitors & Remediates the many Threat Surfaces within your chosen Third Sector Organisations Desktop(s) & Laptop(s) Endpoints, Servers and Email System.

Mitigating 5 key areas: Asset Management, Availability Monitoring, Compliance Management, Security Monitoring & Vulnerability Management.

Also including Mitigation of Malware & Ransomware Threats through Unified Security Management, with Advanced Threat Control. MCRS can also 'Assist' your organisation in meeting the '5 Key Controls' as laid down by the Cyber Essentials Scheme.

BENEFITS OF MCRS

Gain the immense benefits of IS Know How's Enterprise level Data & Cyber Security Defence for your Charity, Social Enterprise or Not-for-Profits. Essential Endpoint, Server & Email Mitigation that you need to keep your Personnel, Clients and Reputations safe with IS Know How's 'Managed Cyber Resilience Service - MCRS'.

Image Stating the Value from IS Know How

Outsource to 24x7x365 Security Operation Centre

Hassle Free Security Operation Centre (SOC) Monitored & Managed, Minus the Costs of Internal Personnel

End-to-End Security Management

Provides End-to-End Security Management Services for Endpoint Assets (Desktops, Laptops and Servers)

Assists Cyber Essentials Applications

Assists your Organisation Needing to Meet the '5 Key Controls' Before Applying for Cyber Essentials

Preventative & Proactive Mitigation

Provides Blended Preventative and Proactive Mitigation With Round-The-Clock 24x7x365 Mitigation Services

Investigations & Fines

Reduce Downtime, Minimising Your Organisations Risks and Exposure to Regulatory Action or Fines

Protect Organisational Reputation

Increase Your Cyber Security Posture & Mitigate Very Real Reputational Risks

Boost YourCyber Essentials Scheme Requirements with MCRS!

The Cyber Essentials Scheme contains '5 Key Controls' that the National Cyber Security Centre (NCSC) state:

"As a Cyber Essentials scheme Applicant, you must ensure that your organisation meets all the requirements. You may also be required to supply various forms of evidence before your chosen Certification Body can award certification at the level you seek."

Source: Requirements for IT Infrastructure (Cyber Essentials scheme) (External Link)

• ISKH's MCRS assists your organisation, by delivering you the capability to meet the '5 Key Controls' of the Cyber Essential Scheme's Technical Requirements

• Receieve a quick kick-start of a Managed Cyber Resilience Service by Deploying Small, Lightweight Endpoint Agent(s)

• Provides End-to-End Security Management Services for Endpoint Assets (Desktops, Laptops and Servers)

• Provides Blended Preventive and Proactive Mitigation with round-the-clock 24x7x365 Mitigation Services

• 24x7x365 Autonomous Cyber Security Operation Centre (SOC)

Analytics Graphic Icon
  • Secure Configuration
  • Boundary Firewalls & Internet Gateways
  • Access Control
  • Malware Protection
  • Patch Management
Benefits: As the NCSC state, you must meet all of the 5 technical control requirements, as outlined above before submitting an application to your chosen Cyber Essentials Certification & Accreditation body.

ISKH ultimately assists your Third Sector organisations pre-application ability, to gain the likely evidence that you may need, to be able to achieve actual Cyber Essentials certification.

ISKH's Managed Cyber Resilience Service, with a quick implementation and in a very economical manner, delivers a Continuous and full Cyber Resilience in-line with the 5 Cyber Essentials Controls and actually goes beyond.

Therefore, we afford your Third Sector Organisation's 'Managed' access to key Cyber & Data Security Mitigation, Insights and Threat Intelligence, via Web Dashboard analytics reports, increasing your knowledge, awareness and defence in depth.

If you feel that your Third Sector Organisation is ready to begin the Cyber Essentials Scheme process, beyond what ISKH's MCRS can do for your organisation in a pre-application phase; then ISKH have proudly partnered with IT Governance, who are a CREST-accredited certification body, and who have awarded hundreds of certifications, with many more companies achieving certification every day, then get in touch today.

FEATURES OF MCRS

ISKH's Managed Cyber Resilience as a Service, employs a quick implementation that aids the removal of many of your pain points, in an incredibly affordable and seamless manner. Therefore, we afford your Third Sector Organisation 'Fully Managed' access to key Cyber & Data Security Mitigation, Insights and Threat Intelligence, via Web Dashboard Analytics reports, increasing your knowledge, awareness and defence in depth.
Image

1. SECURITY MONITORING SERVICE

If you’re unaware that malware has successfully penetrated your firewall and antivirus protection, your network may be in deep trouble. Get the lowdown on compromised machines via up-to-the-minute Traffic Monitoring.

Third-party blacklists are utilised across your network to track down any connections to IP addresses that are known or suspected to be botnets, phishing or malware sites.

You’ll be notified of specific machines that are communicating with “bad guys” so you can restore order. Allow IS Know How to help you maximise your knowledge of malware and minimise the damage.

  • Proactive Protection: Active Virus Control.
  • Proactive Protection: Two-way Firewall with Intrusion Prevention.
  • 24x7 Monitor for Compromised Systems.
  • 24x7 Track Down any Connections to IP Addresses that are Known or Suspected to be Botnets, Phishing or Malware Sites.
  • Notified of Specific Machines that are Communicating with “Bad Guys” so you Can Restore Order.
  • Help you Maximise your Knowledge of Malware and Minimise the Damage.
  • Automated Blacklist Updating.
Sentinel5 Security Monitoring Cyber Threat Watchtower Icon
MCRS Security Monitoring Icon

MCRS Security Monitoring Diagram

MCRS Security Monitoring Diagram
MCRS Threat Mitigation Service Icon

2. THREAT MITIGATION SERVICE

You’re available to your Third Sector organisations stakeholders, when they need your unparalleled expertise. The same holds true for IS Know How's Managed Services. Our dependable Cloud-based solution, delivers best-of-breed Availability Management and Monitoring, to make certain that your network is operating problem-free around the clock.

The ever-present ISKH Managed Services keeps tabs on everything from servers, computers and printers, to email services, peripherals, and websites. This all-inclusive system, which identifies and corrects potential issues before they cause serious damage, is designed with your ultimate business continuity and uptime in mind.

Next Generation Anti-Malware - an evolution of traditional AV that protects computers from the full spectrum of cyber attacks, delivering the best endpoint protection with the least amount of work. It protects the OS against different malware such as: ransomware, viruses, trojann, spyware, adware, etc. 

Endpoint Detection & Response (EDR) - performs a full range of activities to boost an enterprise-wide visualisation and reduces resource drain and skill requirements for the security teams. 

Endpoint Firewall & Host-based Intrusion Prevention System (HIPS) - protects the endpoint from inbound and outbound unauthorised connection attempts.

Web Content Control - is used to configure your preferences regarding content filtering and data protection for user activity including web browsing, email and software applications. You can restrict or allow web access and application usage, configure traffic scan, antiphishing and data protection rules. 

Device Control & USB Scanning - 

Data Leakage Protection (DLP) - prevents unauthorised disclosure of sensitive data based on administrator-defined rules. You may create rules to protect any piece of confidential information. For example, customer personal information or contact information. 

Behaviour Monitoring & Application Control -
Application Control is another module of layer protection against malware attacks such as ransomware, zero-day attacks, trojans, spyware. It does have flexible policies allowing to whitelist applications and manage the update permissions. 

User Control -
users don't have the possibility to unistall the agent, minimising any risk of infection. If you want to select certain priveleges we can do that and create power users.

Security Policing & Threat Monitoring -
For Security policies we have a default policy and customazible ones with following set of values: Endpoint interface settings such as: visibility, status alerts and technical support information. General settings such as: logging, reporting, password protection and updates. Security settings, namely: antimalware, firewall, privacy control and user control modules.

Full Disk Encryption -
protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault). It takes advantage of the native device encryption to ensure full compatibility and maximized performance. With no additional agent to deploy or key management server to install. The use of existing endpoint security infrastructure to manage Full Disk Encryption, enables fully centralized deployment with minimal administrative effort.

3. VULNERABILITY MANAGEMENT SERVICE

IS Know How’s Cloud-based solution, which features a single all-knowing managed service that covers all the IT bases, to keep your network running like a well-oiled machine.

With such integral features as Patch Management, Antivirus Checker, Traffic Monitoring, and Firewall Checker, IS Know How Managed Services via its Sentinel agent puts you on the path to improved security, increased user productivity, and total peace of mind.

Patch Management - Automate the entire process of monitoring and deploying patches for Windows, Office, and other applications.

Antivirus Checker - Make sure your systems' anti-virus protection is up-to-date and working properly.

Traffic Monitoring - Protect against machines talking with botnets or malware and phishing sites.

Firewall Checker - Ensure all systems have properly configured firewalls.

Notifications and Reports - Gain insight into and control of your network.

MCRS Vulnerability Management Diagram

MCRS Vulnerability Management Diagram
MCRS Vulnerability Management Cyber Threat Watchtower Icon
MCRS Vulnerability Management Service Icon
MCRS Compliance Management Service Icon

4. COMPLIANCE MANAGEMENT SERVICE

The road to managing compliance is paved with good intentions. However, whilst the vast majority of people don't set out to intentionally misread unwanted software, bad passwords, phishing, and other negative influences; of course, the more users on your network, then the more difficult that road is to navigate and the more chances that you have of crash-landing in a pothole.

IS Know How's cost-effective cloud-based solution smooths out your ride, by providing the right tools to safely maintain compliance across your organisation. Additionally our detailed reports will steer you in the right direction, when it comes to User Behaviour, Unapproved Software or Theft Control. 

User Behaviour - Follow inappropriate user behaviour, fix it, and even take steps to prevent it from happening. Unapproved Software - Monitor to see if unapproved software is installed, such as file sharing applications that can drain bandwidth. Theft Control - View log-on, IP, and location as well as set-up a remote control session to assist in.

Unapproved Software - Monitor to see if unapproved software is installed, such as file sharing applications that can drain bandwidth at the very least. 

Theft Control - View log-on, IP, and location as well as set-up a remote control session to assist in recovery of stolen machines.

Notifications and Reports - Gain insight into, and control of, your network.

MCRS Compliance Management Diagram

MCRS Compliance Management Diagram
MCRS Compliance Management Cyber Threat Watchtower Icon

5. AVAILABILITY MONITORING SERVICE

You’re available to your Third Sector organisations stakeholders, when they need your unparalleled expertise. The same holds true for IS Know How's Managed Services. Our dependable Cloud-based solution, delivers best-of-breed Availability Management and Monitoring, to make certain that your network is operating problem-free around the clock.

The ever-present ISKH Managed Services keeps tabs on everything from servers, computers and printers, to email services, peripherals, and websites. This all-inclusive system, which identifies and corrects potential issues before they cause serious damage, is designed with your ultimate business continuity and uptime in mind.

Servers - Keep tabs on your server’s responsiveness and available disk space in an effort to reduce downtime.

Computers - Check all computers for overloaded processors and adapter errors to improve productivity.

Email Services - Make sure your SMTP server is available, replying, and not configured as an Open Relay.

Peripherals - Certify that your NAS devices and UPS are up and running to maintain valuable uptime.

Websites & Domains - Improve website uptime, keep domains from expiring, and track service level agreements.

MCRS Availability Monitoring Diagram

MCRS Availability Monitoring Diagram
MCRS Availability Monitoring Cyber Threat Watchtower Icon
MCRS Availability Monitoring Service Icon
MCRS Asset Management Service Icon

6. ASSET MANAGEMENT SERVICE

Old school Asset Management systems are challenging and clunky - not to mention time- and money consuming. Hardware and software inventory of servers, workstations, and laptops have to be taken on every network. So for e.g. if that network has more than 20 machines, or an array of machines in various locations, well, you do the calculations.

Leave that old school path behind and go to the head of the class with IS Know How’s Managed Services. Our cloud-based Asset Management system enables you to access vast amounts of information of the granular kind, to track every hardware set-up and software detail. And because it’s fully automated, you’ll graduate to a more efficient and cost-effective way of managing your assets.

Computers - Track network computers and standalone machines to gain access to more detailed information.

Servers - Effectively manage your servers and establish remote control server connections.

Virtual Machines - Attain an outstanding overview of everything from manufacturers to models to operating systems.

Peripherals - Automatically track all peripherals as assets and eliminate the need for physically checking switches.

Software - Save money by tracking unused licensed software and automatically update software asset management inventory.

Users - Delve deep into user usage history and save invaluable user inventory updating time.

Asset Reports - Easily pull hardware, software, and user reports to track assets and changes.

MCRS Asset Management Diagram

MCRS Asset Management Diagram
MCRS Asset Management Cyber Threat Watchtower Icon
Powered by Thoughthive Security Solutions

FURTHER SERVICE INFORMATION

How ISKH's Managed Cyber Resilience Service for Endpoints, Servers & Email Works?

No installation is required for the main MCRS Management System Agent, which means that you are only required to install an incredibly lightweight MCRS Endpoint / Server Agent and these are Fully Managed via IS Know How's Cloud system.

Once you install the MCRS Endpoint / Server Agents to your Third Sector organisation's device(s), this will enable you to immediately begin mitigating the many risks to said devices data and that of your organisation as a whole. MCRS is the perfect solution for your Desktop(s), Laptop(s), Server devices and Email systems, helping you to Mitigate your Reputational Risks.

Technology vs. Process Flow

MCRS Technology Versus Process Flow

How Do We Install MCRS - Step #1

Sentinel_1 IS Know How - Managed Cyber Resilience Service All-in-One Security1. Once you have Subscribed for this service, await the email notification of the Sentinel Agent Download Link.

How Do We Install MCRS - Step #2

Sentinel5 - Diagram22. Once notified, Download and Install the ISKH Sentinel Agent & Threat Mitigation Agent, which you then Deploy the required Agents to Devices in your Network from ISKH Managed Services that you have subscribed to.

How Are Your Data Risks Mitigated?
IS Know How's MCRS System will gather information from two vital sources – through locally installed agents on your desktop(s), laptop(s), server devices and email system, as well as by external testing completed via ISKH's Cloud-based system.

The installed ISKH MCRS Agent is a small application (about 2 Mb) that will run silently in the background using nearly zero resources, as it collects the required data from your designated devices. Affording your Third Sector organisation or Micro-Business with incredible Best-of-Breed Mitigation.

ISKH MCRS system will gather information about your organisation’s:
  • Hardware Type and Status
  • Software Installed and Usage
  • Network Statistics and Usage
  • Logged-in Users
*Note* At NO point, are your device files or their contents viewable from the whole ISKH MCRS system or that of our personnel.

The accumulated information is immediately encrypted and sent to ISKH Cyber Watch Tower, where the agent and cloud-based system validates one another, prior to exchanging data.

ISKH’s Cloud-based system will only receive information when needed e.g. a full list of installed software, or just the differences since last posting, resulting in just a few Kb of network bandwidth that this requires to be used.

The collected statistics are then analysed by an IS Know How Cyber Watch Tower Analyst to quickly spot areas of concern, flag issues, calculate inventory status and track usage statistics. The resource-intensive data collection process is done by ISKH’s Cloud-based system without putting extra strain on your organisation’s network.

If an issue is detected, it will be rectified automatically where possible but on the rare occassion that this is not possible; an ISKH Analyst alerts you through the ISKH Security Incident ticket system, also via an email or mobile phone text message. You will then receive another status message once the issue is fixed, to allow peace of mind and all without disruption to your device(s) that MCRS for Desktop Endpoint(s), Server(s) and Email system that it is installed upon.

CALCULATE, FEATURE MATRIX & PLAN INFO

{{tab MCRS Instant Subscription Cost Calculator |alias=mcrs-instant-subscription-cost-calculator|blue|active}}

Managed Cyber Resilience Service is our Entry-Level Endpoint & Server Mitigation as a Service delivered via Monthly Subscription that is a 'Fully Managed, So You Don't Have To' Cloud-based Mitigation service, which Manages, Monitors and Remediates everything possible within your chosen Third Sector Organisations Desktop(s), Laptop(s) Endpoints, Servers and Email.

Starting at £16.00 per device / 1 year subscription. Add additional years to save more.

Choose Subscription Term:
Invalid Input
Price Band Per Device, Per Month:
Invalid Input
Invalid Input
Invalid Input
Choose Device Total:
Please select the correct 'Price Band Per Device' from the above options, relative to your number of required devices.
Invalid Input
Invalid Input
Invalid Input
Invalid Input
In order to submit this Enquiry, you are asked to positively consent - or we cannot process your request. Please consider your choice and amend as necessary.
Invalid Entry, Please Correct.

By requesting an email copy of the above for your records, the Personally Identifiable Information (PII) of your Email Address is ONLY used by IS Know How for this specific request of a 'MCRS Instant Subscription Cost Calculation', and therefore IS Know How will NOT hold any PII of yours at this point.

Subscription Cost Calculator Price(s) Exclusive of VAT. Prices may be Subject to Change. Final Pricing will be confirmed upon Subscription Plan Order Placement.

{{tab MCRS Feature Matrix |alias=mcrs-feature-matrix|blue}}

  • From Just
    £13.50 Per Month, Per Endpoint or Server
  • Sentinel 5 EndPoint / Server Feature List:

  • Agent Compatibility:
  • Windows  
  • MAC OS X  
  • Linux  
  • Virtual Machines  

  • Security Monitoring:
  • Monitor for Compromised Systems

  • Monitor More Systems in Less Time

  • Automated Blacklist Updating (Botnets, Phishing & Malware)

  • Active Virus Control

  • Two-Way Firewall with Intrusion Prevention


  • Vulnerability Management:
  • Antivirus Updates Checker  
  • Traffic Monitoring  
  • Firewall Policy Monitoring  
  • Software Vulnerability Monitoring  
  • Automated Patch Management  

  • Compliance Monitoring:
  • Unapproved Softwares  
  • Removable Drive Usage  
  • Password Protection Policies  
  • Theft Control  

  • User Management:
  • Online Status  
  • Application Usage  
  • User Location Tracking  
  • Track Logon History  

  • Asset Management Services:
  • Hardware Inventory  
  • Comprehensive Hardware Details  
  • Online Status  
  • Network Configurations  
  • Hardware Resource Usage  
  • Software Inventory  

  • Availability Monitoring:
  • Server Availability  
  • Server Capacity  
  • Service Monitoring  
  • Computer Capacity  
  • Peripheral Availability  
  • Network Errors  
  • Email & SMTP Monitoring  
  • Website and Domains  

  • ISKH 24x7 Escalation:
  • Email Notifications  


  • ISKH Reports:
  • Executive Summary Report  
  • Monthly Reports  
  • From Just
    £13.50 Per Month, Per Endpoint or Server

{{tab Threat Mitigation Feature Matrix |alias=mcrs-feature-matrix|blue}}

  • Included with your MCRS Package
  • Threat Mitigation Feature List:

  • Agent Compatibility:
  • Windows  
  • MAC OS X  
  • Linux  
  • Virtual Machines  
  •     
    Physical & Virtual Endpoint Security Features:
  • NEW Advanced Anti-Exploit Detection

  • NEW Triple Anti-Ransomware Defense

  • Anti-Virus and Anti-Malware

  • Two-way Firewall with Intrusion Detection/Prevention

  • Search Advisor and Web Filtering

  • Data Protection

  • User Web and Application Control

  • Power User and Restricted User Modes

  • Remote and Local Quarantine Management

  • Security Policies and Nested Computer Groups

  • Multi-language Support

  • Real-Time Control of Remote Users (Threat Management Console)

  • Reduce Infrastructure Costs with Smart Scanning

  • Agentless Security for VMware NSX

  • Network Discovery and Mass Remote Install Option

  • Role-based User Model

  • Full Protection for Virtualised Systems

  • Available Web Console (Cloud)

  • Device Control and USB Scanning

  • Uninstalls Competitive Solutions

  • Endpoint Security Relay

  • Audit Logs

  • Email Notifications

  • Email Notifications

  • Monitoring Dashboard and Reports

  • Integration with VMware, Citrix and Microsoft Active Directory™

  • Multi-Platform Coverage

  •   
    Email Security Features:
  • Top Antispam Detection Rates

  • Behavioral Analysis and Zero-Day Protection

  • Smart Scanning

  • Comprehensive Email Filtering

  • Fast Deployment

  • Protection Against Email-Borne Viruses, Malware, or Phishing Attempts

  • On-Demand Scanning

  • End-to-End IT Monitoring

  • Website and Domains  

  • ISKH 24x7 Escalation:
  • Email Notifications  


  • ISKH Reports:
  • Executive Summary Report  
  • Monthly Reports  
  • Price included in MCRS Packages

{{tab Plans & Prices |alias=mcrs-plans-and-prices|blue}}

NO Hidden Charges:

No one likes hidden charges, or even locating a required and suitable service, to be faced with Price on Application (POA) and other variations. That’s why IS Know How have a firm commitment; where our pricing is firstly transparent, that we do not believe in hidden fees and the price that you see, is indeed the price that you will be charged as per your chosen services payment structure.