NexGen Endpoint Protection - Cylance Protect

Part of our responsibility as your Managed Services Provider is to make sure that your data is protected from threats that are getting more numerous and aggressive.  We address changes and enhancements in technology as they are appropriate to you.  We test them as to their effectiveness.  Any technology that we bring to you, we already use, in house, at Haber Group.

Today we want to discuss: “How does bad software get into your company?”  Unfortunately, the answer, while simple is difficult or impossible to prevent.  It’s people!  You and your staff.  They click on things that they shouldn’t.

The paths into your company are emails with links or links from bad websites.  It’s rare that you are attacked via your managed firewall and even rarer that anything gets through.  Even though you and your staff are not administrators of your local PC, you can still run programs and certain programs will cause havoc.

 To prevent this, we want you to utilize three different methods to prevent access to these bad links:

  • Mimecast Threat Protection to filter bad links in emails
  • Firewall Gateway Threat Protection to filter out malicious links from the web
  • A NextGen Antivirus product

 Current AV software will catch and prevent many types of Malware, but they are not up to the task of dealing with Zero-Day Threats.  They currently depend upon downloading virus signatures to look for bad-behavior.  This can also make them a heavy load on your computer.

Haber Group has been researching and testing NextGen antivirus.  We have selected the only product that we have found that protects against zero-day threats and Ransomware.  It’s called Cylance and it’s amazing.  You can read about it Here.  It’s a bundle of a few Cylance products.

It is not an inexpensive piece of software but we feel that it’s so important we are making it available to our Managed Clients at close to our cost.  We are not charging for installation or configuration.  It’s so important that we are making this a required addition for our managed clients.

We are scheduling two Webinars:  2:00pm - Wednesday, September 14, 2017 and 4:00pm - Thursday, September 21, 2017.  Hopefully you will be able to make one. try to be on one of them.  After these we will begin scheduling the deployment.  If you are interested in getting started sooner, let me know.

Please Click Signup Link.

The deployment involves two phases:  Installation on all Laptops. Workstations and servers. Running in monitoring mode for a week.  Then going live on the product

We take your protection seriously and we know that you do to.  Please feel free to share your thoughts with me or to contact me for further clarification.



Tip of the Week: 3 Tips to Turn You Into An Outloo...
How Much Damage Can The Weather Do To Your Busines...

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Hackers Privacy Malware Business Internet Business Computing Microsoft Hosted Solutions Computer Software Backup Windows 10 Ransomware Google Network Security Smartphone User Tips Android Mobile Devices IT Services Hardware Data Management Small Business Windows Browser Gmail Productivity Managed IT Services Tech Term App Saving Money Cloud Computing Business Continuity Data Internet of Things Facebook Server Upgrade Encryption Phishing Word Cybersecurity Office 365 Artificial Intelligence Business Management Disaster Recovery Data Recovery Smartphones IT Support Managed Service Provider Remote Monitoring Efficiency Office Tips Productivity Windows 10 Workplace Tips Social Media Chrome Tip of the week Data Backup IT Support Big Data Government Microsoft Office Infrastructure Spam Innovation Outsourced IT Customer Service IT Management Settings Apple Two-factor Authentication Analytics Data storage Employer-Employee Relationship Content Filtering Firewall Vulnerability Bandwidth Antivirus YouTube Passwords Miscellaneous communications WiFi Robot Risk Management Avoiding Downtime Money The Internet of Things Applications VoIP Managed IT Services Communication Augmented Reality Mouse Vendor Management Telephone Systems Save Money LiFi Safety Maintenance Network Mobile Device Virtual Reality Hacker Apps Storage Scam Hacking Tablet Paperless Office Hosted Solution SaaS Outlook Unified Threat Management Presentation VPN Monitors Holiday Search IBM Data Security HIPAA Office Wireless Data loss Business Technology Printing Wireless Technology Virtual Private Network Automation Administration Customer Relationship Management End of Support BYOD Recovery Server Management Wi-Fi Computing Google Drive Website Password Mobile Security Downloads IT Technicians File Sharing Wires Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Unified Threat Management Solar Hard Drives Statistics Best Practice telephony Break Fix Cookies Samsung 5G Spyware Superfish Information Technology Cooperation Google Docs Black Friday Regulations Halloween Address Writing Hotspot Professional Services Websites Identity Theft Cortana Work Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Patch Management Windows 8 Computers Microsoft Excel Star Wars Training Fun Quick Tips User Error Business Intelligence Refrigeration Bluetooth Business Growth Dark Web Nanotechnology Downtime User Google Wallet Staff Automobile Cyber Monday Social Networking Scary Stories Public Speaking Corporate Profile Current Events Retail Language USB Optimization Google Calendar Chatbots IP Address Cybercrime Competition Solid State Drive Display Blockchain Cost Management VoIP Legal Alt Codes Dark Data Net Neutrality Screen Reader How To Networking Drones Printer Wearable Technology IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Legislation Identity Mobile Office Hard Disk Drive Social Permissions Assessment Education Time Management Undo Cabling Typing FCC Smart Tech Firefox Access Control eWaste Marketing BDR Servers Deep Learning Humor Distributed Denial of Service Router Alerts Service Level Agreement Digital Payment Experience Unified Communications Operating System Comparison Chromebook Mobile Device Management Running Cable Hacks Fraud Internet Exlporer Politics Gadgets Application Network Management Collaboration Cables Virtualization Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Techology Budget SharePoint Continuity Google Maps Bring Your Own Device sip Managed IT Service Modem Buisness Digital Lenovo How To Licensing Specifications Compliance Lithium-ion battery Laptop Mail Merge Value Tech Support Document Management IT solutions Smart Office Users Touchscreen Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Domains Mobile Computing Travel Law Enforcement Physical Security Notifications G Suite CrashOverride Upgrades Twitter Botnet Supercomputer Motion Sickness FinTech Gadget Staffing Administrator Company Culture Crowdsourcing Taxes 3D Printing Personal Information Web Server Emergency Machine Learning IT Budget Update GPS Computer Repair Managing Stress IT Consultant Unsupported Software Processors Cameras Relocation Meetings Tracking Health Cleaning Mobile Data Alert CCTV Private Cloud Emoji Webcam