24/7/365 Security Operation Centre Managed & Monitored

Threat Mitigation for Desktops, Laptops, Servers and Email

Third Sector Third Sector Fully Managed Security Threat Management & Mitigation
ISKH's Threat Mitigation as a Service, is a ‘Fully Managed So You Don’t Have To’ Cloud-based solution that delivers Mitigation and Unified Security Management, with Advanced Threat Control. It will aid your Mitigation against various threats, such as Malware and Ransomware and enjoys various other controls, all managed for you.

It is facilitated via the Threat Management Agent, which Monitors, Manages and Remediates the many Threat Surfaces within your Third Sector Organisations Desktop(s), Laptop(s), Server(s) Endpoints or Email system, that you may likely miss. ISKH's Threat Management & Mitigation is incredibly effective at delivering a seamless and stress-free, Optimised Protection for your Desktops, Servers, Virtual / Physical Machines, and Email Systems.

Available only with ISKH's ‘Managed Cyber Resilience as a Service’, Read More Here...coupled with our Security Operation Centre (SOC) Powered by ThoughtHive Security Solutions, delivering an overall End-to-End Threat Management Solution, which helps to Guard your Organisation and its Valuable Data; against the vast amount of possible Threats and Attack Vectors with Firewall, Intrusion Detection, Device Control and Web Filtering at its heart.
Combined with ISKH's MCRS, Read More...

Personally Identifiable Infomration IconISKH's Threat Mitigation Service, does NOT store any Personally Identifiable Information (PII) during the course of it's use for your Third Sector Organisation.

The technology used by ISKH is of course required to scan the various elements of data within your infrastructure, that the given service aids mitigation points for; for traces of the many malicious traits that are known or found. Rest assured that your privacy including that of all your data, is always of huge paramount importance to us here at IS Know How.

Key Features

Security for Endpoints:

Protects unobtrusively any number of Windows, Linux and Mac OS X laptops, desktops and servers by using top-ranked antimalware technologies. Additionally, Windows systems benefit of even more enhanced security with a two-way firewall, intrusion detection, web access control and filtering, sensitive data protection, application and device control. Low system usage ensures performance improvements. The solution provides an alternative to legacy antimalware systems by combining industry-acclaimed security technologies, with simplicity of deployment and management through the powerful Threat Management System. Proactive heuristics are employed, to classify malicious processes based on their behavior, detecting new threats in real time.

Security for Virtualised Environments:

Security for Virtualised Environments is the first all-encompassing security solution for virtualised datacenters, protecting virtualised servers and desktops on Windows and Linux systems. Powered by cutting-edge caching technologies, the solution drives significant performance gains and boosts server consolidation by up to 30% compared to traditional antimalware.

Security for Exchange:

Security for Exchange provides antimalware, antispam, antiphishing, attachment and content filtering seamlessly integrated with the Microsoft Exchange Server; to ensure a secure messaging and collaboration environment and increase productivity. Using award-winning antimalware and antispam technologies, it protects the Exchange users against the latest, most sophisticated malware and against attempts to steal users' confidential and valuable data.

How Is Information Collected?

IS Know How's Sentinel System will gather information from two vital sources – through locally installed agents on your desktop(s) or laptop(s) devices, as well as by external testing completed via ISKH's Cloud-based system. The installed ISKH Sentinel5 Agent is a small application (about 2 Mb) that will run silently in the background using nearly zero resources, as it collects the required data from your designated devices. Affording your Third Sector organisation with incredible Best-of-Breed Mitigation.

ISKH Sentinel system will gather information about your organisation’s:

  • Hardware Type and Status
  • Software Installed and Usage
  • Network Statistics and Usage
  • Logged-in Users

*Note* At NO point, are your device files or their contents viewable from the whole ISKH Sentinel5 system.

The accumulated information is immediately encrypted and sent to ISKH Cyber Watch Tower, where the agent and cloud-based system validates one another, prior to exchanging data.

ISKH’s Cloud-based system will only receive information when needed e.g. a full list of installed software, or just the differences since last posting, resulting in just a few Kb of network bandwidth that this requires to be used.

The collected statistics are then analysed by an IS Know How Cyber Watch Tower Analyst to quickly spot areas of concern, flag issues, calculate inventory status and track usage statistics. The resource-intensive data collection process is done by ISKH’s Cloud-based system without putting extra strain on your organisation’s network.

If an issue is detected, it will be rectified automatically where possible but on the rare occassion that this is not possible; an ISKH Analyst alerts you through the ISKH Security Incident ticket system, also via an email or mobile phone text message. You will then receive another status message once the issue is fixed, to allow peace of mind and all without disruption to your device(s) that Sentinel5 for Endpoint is installed on.

How Do We Install Threat Mitigation?

No installation is required for the main Sentinel5 Threat Management System Agent, which means that you are only required to install an incredibly lightweight Threat Mitigation Agent and these are Fully Managed via IS Know How's Cloud system.

Once you install the Threat Mitigation Agents to your Third Sector organisation's device(s), this will enable you to immediately begin mitigating the many risks to said devices data and that of your organisation as a whole. IS Know How's Threat Mitigation Service, is a big part of the perfect solution for your Desktop(s), Laptop(s), Virtualised Environment(s) and Email Server(s) devices, helping you to Mitigate your Reputational Risks.

1. Once you have Subscribed for either MCRS Standard or Plus Editions, await the email notification of the Threat Management Agent Download Link

Sentinel5 - Diagram1

2. Once notified, Download and Install the ISKH Threat Management Agent, which you then Deploy the required Agents to Devices in your Network from ISKH Managed Services

Sentinel5 - Diagram2

3. Subscribed Devices will then Communicate with ISKH’S Cloud Backend and final automated setup is completed

Sentinel5 - Diagram3

4. ISKH's Threat Management & Mitigation Service will then integrate with ISKH's Cyber Watch Tower as part of your chosen MCRS Standard or Plus Edition, will now begin to Manage your IT Environment 24x7x365 - Mitigating Your Organisation's Risks

Sentinel5 - Diagram4
Physical and Virtual Endpoint Security Features Icon

Physical and Virtual Endpoint Security Features

NEW Advanced Anti-Exploit Detection

ISKH's Threat Mitigation includes new Anti-Exploit technology which helps reduce the APT Attack Surface, by tackling Advanced, Evasive Exploits that allow Attackers to Penetrate your infrastructure undetected.

Agentless Security for VMware NSX

Threat Mitigation Service tightly integrates with VMware NSX, ensuring state of the art guest introspection.

NEW Triple Anti-Ransomware Defense

With a database of over 2.8 million ransomware samples, an intelligent vaccine that stops ransomware from encrypting, and a set of powerful heuristics dedicated to catching unknown ransomware in real-time, ISKH offers your Third Sector Organisation the Ultimate Ransomware Protection.

Network Discovery and Mass Remote Install Option

Once installed on one computer, Threat Mitigation Service automatically detects unprotected systems, and you can remotely deploy protection to all of them.

Anti-Virus and Anti-Malware

ISKH detects malware using signatures, heuristics, continuous process monitoring, and a global threat intelligence network.

Role-based User Model

Internal accounts with different access privileges can be created in the management console.

Two-way Firewall with Intrusion Detection/Prevention

The fully-featured two-way personal firewall with Intrusion Detection is essential in blocking intrusion and hijack attempts.

Full Protection for Virtualised Systems

While other solutions are limited to doing file scanning in virtual environments, ISKH offers complete protection including process, memory and registry scanning.

Search Advisor and Web Filtering

ISKH's Threat Mitigation Service marks potentially harmful websites in the search results and blocks known malicious pages.

Available Web Console (Cloud)

With ISKH hosting the management infrastructure, the web console is available soon after successful subscription sign-up.

Data Protection

Prevent the loss of confidential data by setting filters that will block the transmission of sensitive information.

Device Control and USB Scanning

Minimise risks of infections and data loss, with automatic USB scanning and device control.

User Web and Application Control

Restrict or block employee access to applications or web pages.

Uninstalls Competitive Solutions

Competitive solutions are automatically detected and seamlessly removed during the Threat Mitigation Service installation process.

Power User and Restricted User Modes

You can choose to allow or deny users the ability to modify security settings for their system.

Endpoint Security Relay

Product and signature updates can be distributed more efficiently inside the network through a system that works as a relay.

Remote and Local Quarantine Management

The quarantine is stored locally but can be managed centrally from the control console.

Audit Logs

Actions performed in the management console can be tracked in the audit logs.

Security Policies and Nested Computer Groups

Assign security policies to orgnisations or groups of computers.

Email Notifications

Set up email notifications to be triggered automatically when certain events occur.

Multilanguage Support

The solution is available in English, German, Spanish, French and Romanian.

Monitoring Dashboard and Reports

Centrally monitor the security posture of the organisation using on-demand or scheduled reports.

Real-Time Control of Remote Users (Threat Management Console)

With the ISKH-hosted management console, you can control and monitor remote users in real time.

Integration with VMware, Citrix and Microsoft Active Directory™

Integration with VMware vCenter, Citrix XenServer, and Microsoft Active Directory simplifies deployment and security management for virtual and for physical machines.

Reduce Infrastructure Costs with Smart Scanning

Smart Scanning minimises resource consumption by centralising scan tasks to dedicated machines. The local installation package, ISKH's Threat Management Endpoint Security Tools, can adjust its functionality and switch between local, cloud, and centralised scanning depending on the policy settings and the type of machine it is installed on.

Multi-Platform Coverage

GravityZone provides optimised protection on all the known hypervisors - VMware vShield, VMware ESXi, Citrix Xen, Microsoft Hyper-V, Red Hat KVM, Oracle VM and more.

Email Security Features

Top Antispam Detection Rates

ISKH Email coverage includes top spam detection rates with, a minimum number of false positives.

Protection Against Email-Borne Viruses, Malware, or Phishing Attempts

The Real-Time Data Analysis filter employs Global Protective Network security cloud to detect spam messages and to provide rapid protection against 0-day and advanced threats.

Behavioral Analysis and Zero-Day Protection

Using powerful heuristic antispam filters, ISKH detects unknown spam messages.

Comprehensive Email Filtering

In addition to antimalware and antispam, the solution also includes attachment and content filtering for enhanced protection and control.

Smart Scanning

Antimalware scanning can be offloaded to centralised security servers from the protected mail servers.

On-Demand Scanning

The product filters incoming and outgoing traffic but can also be used to run an on-demand antimalware scan of the Exchange Information Store.

Fast Deployment

The product installation is simple to set up and can be installed in a minimal timescale.

End-to-End IT Monitoring

Centralised management and reporting for endpoint and email protection, streamlines IT processes.

Email Security Features Icon
Powered By ThoughtHive Security Solutions Logo

System Requirements

Windows 10, Windows 8, 8.1, Windows 7, Windows Vista (SP1), Windows XP (SP3)

Mac OS X Sierra (10.12.x), Mac OS X El Capitan (10.11.x), Mac OS X Yosemite (10.10.5), Mac OS X Mavericks (10.9.5), Mac OS X Mountain Lion (10.8.5)

Linux: Red Hat Ent. 6.2, 6.1, 5.7, 5.6; CentOS 6.2, 6.1, 5.7, 5.6; Ubuntu 11.04, 10.04; SUSE Ent. Server 11; OpenSUSE 12, 11; Fedora 16, 15

Windows Embedded 8 Standard, Windows Embedded 8.1 Industry, Windows Embedded Standard 7, Windows Embedded POSReady 7, Windows Embedded Enterprise 7, Windows Embedded POSReady 2009, Windows Embedded Standard 2009, Windows XP Embedded with Service Pack 2

Windows Server 2012, Windows Server 2012 R2, Windows Small Business Server (SBS) 2011, Windows Small Business Server (SBS) 2008, Windows Server 2008 R2, Windows Server 2008, Windows Small Business Server (SBS) 2003, Windows Server 2003 R2, Windows Server 2003 with Service Pack 1, Windows Home Server
Minimum: 2.4 GHz single-core CPU
Recommended: 1.86 GHz or faster Intel Xeon multi-core CPU

Memory:
Minimum free RAM: 512 MB
Recommended free RAM: 1 GB
HDD space: 1.5 GB of free hard-disk space
Exchange 2013, 2010, 2007;
Exchange 2013, 2010, 2007;
Roles: Edge, Hub and Mailbox;
Protocols: SMTP, MAPI, Exchange ActiveSync;

To Begin Reducing Your Risks and Securing Your Reputation!

Sentinel5

24x7x365 Managed Security Monitoring and Mitigation For Your Organisations Endpoint & Server Devices.

Increase Your Third Sector Cyber Security Resilience & Mitigation

WebSentinel

24x7x365 Managed DDoS Multi-Layer Threat Monitoring Service For Your Third Sector Organisations Website(s).

Increase Your Third Sector Cyber Security Resilience & Mitigation

MCRS

24x7x365 Combined Best-of-Breed Managed Cyber Resilience Service (MCRS) For Your Organisations Devices.

Increase Your Third Sector Cyber Security Resilience & Mitigation

Contact Us

Phone
02921-679-021 (Sales ONLY)
Address
Britannia House, Caerphilly Business Park, Van Road, Caerphilly, Wales, UK. CF83 3GG
Legal Reg Info
Information Security Know How Ltd. is a Limited Company, Registered in England & Wales.

Company No: 09648503
VAT No: GB 232 2137 53

ISKH Site Newsletter

Sharpen your Third Sector Data & Cyber Security Mitigation Knowledge, by Subscribing to Our 'Mitigation Bits & Bytes'. Sharing a Myriad of Sector and Security Focused News, Infrequent Updates about IS Know How's Managed Cyber Security Service(s) Offers, Surveys, Research, Discussions and more...

Third Sector Organisation Personnel?

captcha 




By selecting 'Yes, Sign Me Up!' above, You Consent that we may Collect, Store and Process your Personal Data in accordance with Our Privacy Policy, Cookies Policy & Website Terms & Conditions.
All Newsletter Emails include an Unsubscribe / Modify Subscription link, where you may Opt-Out or Amend your Preferences at any time. You can also do the same from the 'My Account' menu, if you Register for a full FREE IS Know How Account.

Proud Members Of:

IS Know How is a Proud Member of Cyber Exchange

Our CEO & Founder, Robert Stones is also a ‘Member of the Fraud Advisory Panel’ See more information about them here: About the Fraud Advisory Panel

Payments By:

Powered by Stripe Logo
Stripe Subscription Accepted Payment Cards

Subscribe to the IS Know How 'Mitigation Bits & Bytes' Newsletter.

ISKHIcon100x100Instantly begin your Third Sector Data & Cyber Security Mitigation Journey Today!ISKHIcon100x100

Sharpen your Third Sector Data & Cyber Security Mitigation Knowledge, by Subscribing to Our 'Mitigation Bits & Bytes'. Sharing a Myriad of Sector and Security Focused News, Infrequent Updates about IS Know How's Managed Cyber Security Service(s) Offers, Surveys, Research, Discussions and more...

Third Sector Organisation Personnel?

captcha 




By selecting 'Yes, Sign Me Up!' above, You Consent that we may Collect, Store and Process your Personal Data in accordance with Our Privacy Policy, Cookies Policy & Website Terms & Conditions.
All Newsletter Emails include an Unsubscribe / Modify Subscription link, where you may Opt-Out or Amend your Preferences at any time. You can also do the same from the 'My Account' menu, if you Register for a full FREE IS Know How Account.