We’ll store the logs from your endpoints (Windows, OSX) and Networking Devices (Firewalls etc) offsite for at least 90 days
Our automated agents will make sure that all logs are constantly being uploaded and searched for anomalies
What actually is this?
Granted, this isn’t the most interesting part of the Assurance package, but it is important. By storing the logs away from the potentially compromised device, we can look back through them should something happen. By analysing the logs, we can see what was accessed, changed or breached for at least 90 days after the initial incident. Longer terms are available upon request.
Why do I need this?
Should you suffer a breach, its your responsibility to find out what has been accessed, and to try and work out how it happened. By storing the logs for your endpoints, networking equipment and Office 365 offsite, we can look at these logs even if they’ve been cleared from the affected device or service.
Key features:
• Automated agents on your devices submit their logs to our servers
• Anomalies detected and reported to our Helpdesk to check
• 90 Days storage minimum
• Adds the ability to troubleshoot and investigate should a breach happen, or to provide to a cyber security firm should the worst happen
Other items in Assurance
Experience an advanced level of network security with our 24×7 managed EDR solution. A dedicated team of security professionals monitors and manages your endpoint detection and response (EDR) system around…
Stay safe on your devices anywhere with our top-notch antivirus protection for your endpoints. Our antivirus solution provides comprehensive protection from threats that could compromise your devices and digital environment,…
Fast, efficient support from our UK based helpdesk. Unlimited user support mon-fri 8:30-17:30pm From helping getting a printer working, to setting up your new team members, think of us as…
Cyber Essentials is a great standard that you should be looking to attain. All the tools we include with this package should allow you to pass the Cyber Essentials certification.…
Office 365 is great, but the lack of backups included is a bit scary. Our Office 365 Backup solution will take a backup daily of all of your data. It…
We spend a lot of time tracking the latest critical vulnerabilities that crop up every day. Our systems will keep your windows devices monitored in real time, and will even…
Defending against today’s advanced threats requires a new approach to email security. With banners, warnings and manual checking by our support team, Ironscales’ best-in-class email security platform is powered by…
Keeper enterprise password management gives you and your team a secure place to keep their passwords. With easy to use applications and browser plugins, Keeper will create your passwords for…
Sharpen your cyber defenses and security instincts with our Phishing Simulation service. Designed to replicate the tactics used by real-world cybercriminals, these simulations provide your team with hands-on experience in…
No matter if you’re in the office, or working on a shared WIFI, our web security firewall will keep your endpoint secure. By automatically blocking nefarious traffic, or categories that…
We’ll store the logs from your endpoints (Windows, OSX) and Networking Devices (Firewalls etc) offsite for at least 90 days Our automated agents will make sure that all logs are…
Step up your defenses with our targeted Security Awareness Training. Our interactive training modules are designed to equip you and your team with the knowledge and skills needed to recognise,…