Cyber Security

Ransomware, viruses, worms, spyware, identity theft the list goes on. Network attacks are becoming more widespread and consequences more serious. And nothing stands still; protective measures must develop to stay ahead of advancing criminal resources. DMS only employs products that are continually under review and development to offer the best chance of keeping your network safe and secure

Cyber Security

 

Cyber Security For a protective firewall that monitors traffic to your network, DMS uses Fortinet’s Fortigate for head office solutions, with Zscaler preferred for companies with multiple mobile workers.

Design and Management Systems Ltd

Fortigate

Protect mission critical applications

Highly scalable segmentation and ultra-low latency to protect network segments

Validated security effectiveness

Independently certified and continuous threat intelligence updates provide robust protection from known and unknown attacks.

Enterprise class security management

Consistent policy; Single pane-of-glass to manage security assets irrespective of location or form factor.

Automated risk assessment

Leverage automated workflow and auditing features to deal with scarce security staff; continuously maintain compliance posture.

Security fabric integration

Intelligently share threats across the entire digital attack surface for quick, automated protection.

High-performance protection

Industry’s highest threat protection & SSL inspection performance to protect from malware attacks hiding in encrypted traffic.

Design and Management Systems Ltd

Cloud Firewall

Enables secure local internet breakouts

Provides direct to internet connections for a fast user experience, without any appliances to deploy or manage

Reduces costs and complexity

Optimizes MPLS backhauling spend and eliminates costly and time-consuming patch management, coordination of outage windows, and policy management

Security and access controls for internet traffic on all ports

Delivers firewall-as-a-service to provide security and access controls for internet traffic on all ports, not just 80 and 443, to prevent advanced threats

Brings the entire security stack close to the user

Ensures identical protection for users – wherever they are

Scales services elastically

Handles SSL inspection and cloud application traffic requiring long-lived connections for fast user experience

Logs every session and delivers real-time visibility and policy enforcement

Across all users, all locations, all applications, and all ports and protocols from a single console

Email Security

 

Email is a universal communication tool and the data your users send and receive needs to be protected. It is main concern in Cyber secuirty One of the tools DMS uses is Mimecast Email Security with Targeted Threat Protection, designed to provide next generation protection against advanced email-borne threats such as malicious URLs, malware, impersonation attacks, as well as internally generated threats.

Secure Messaging

Safely transmit and control how users share and how recipients access confidential information through email

 

Continuity Services

Keep email flowing and archives accessible even if the primary system goes down. Mimecast works with mail on-premises, in the cloud or hybrid

Large File Send

Enable users to send and receive large emails through email without impacting your environment

 

Control Content and Data Loss Prevention

Inspect and manage how users send and receive sensitive information via email

Platforms

Mimecast knows email technologies and works with Microsoft Office 365, Microsoft Exchange or Google Apps for Work

Design and Management Systems Ltd

Device Security

DMS uses Microsoft Intune for mobile device management, mobile application management and PC management from the cloud. To complement Intune, DMS is pleased to use Webroot Endpoint to provide endpoint protection for all the devices, or ‘endpoints’ on your network – to help keep critical systems, intellectual property,good cyber security, client data, employees and guests safe from ransomware, phishing, malware etc. Benefits include …

Multi-vector protection

Protects against threats in real time across email, browsers, files, URLs, ads, apps etc …

Industry-leading efficacy

Secures endpoints with 100% efficacy over a 24-hour period.

No reimaging

Journaling/rollback features restore files to uninfected state; no need to reimage

Flexible billing

Offers monthly and annual subscription options; pay as you go, per device, per month.

Deep learning intelligence

A layered approach to global threat intelligence to continually refine and enhance classification accuracy.

Fast deployment & scans

Small endpoint client agent deploys/scans in seconds; always up-to-date – no bulky updates or definitions.

Online management

Enables anywhere, anytime, endpoint management online with hierarchical controls and visibility.

Lower TCO

Minimal system burden, improves automation, and streamlines management to boost MSP profitability.

Zero-hour security

Advanced behaviour heuristics identify and protect against never-before-seen threats

No conflicts

Runs alongside other security software. No need to uninstall existing protection.

RMM & PSA integrations

Integrates with leading RMM and PSA platforms for ‘single pane of glass’ MSP mangmnt.

MSP-Friendly Unity API

Enhances automation, reduces management costs, improves reporting, simplifies billing.

Data Security

 

Conditional Access is an Azure AD capability and Cyber security that Intune enhances by adding mobile device compliance and mobile application management. Intune and Azure AD work together to ensure only managed and compliant devices are allowed access to email, O365 services, Software as a Service apps, and on-premises apps.

Many mobile device management (MDM) solutions help protect organisational data by requiring users and devices to meet some requirements. In Intune, this feature is called “compliance policies”. These define the rules and settings that users and devices must meet to be compliant.

 

When combined with conditional access, administrators can block users and devices that don’t meet the rules.

For example, an Intune administrator can require:

User access to company data on mobile devices via password

The device isn't jail-broken or rooted

A minimum or maximum OS version on the device

The device to be at, or under a threat level

You can also use this feature to monitor the compliance status on devices in your organization.

Additionally, you can set a policy in Azure Active Directory to only enable computers that are domain-joined, or mobile devices that are enrolled in Intune to access Office 365 services. Intune provides device compliance policy capabilities that evaluate the compliance status of the devices. The compliance status is reported to Azure Active Directory that uses it to enforce the conditional access policy created in Azure Active Directory when the user tries to access company resources.

GDPR

 

Did you know you have a legal requirement to report major data breaches to the ICO within 72 hours. Failure to notify can result in a fine of up to €1 Million! DMS can take you through your obligations and the requirements of GDPR to help you to become and remain compliant.

REQUIREMENT

You should have robust breach detection, investigation and internal reporting procedures in place’

DATA BREACHES INCLUDE

Sending data to the wrong recipient.

Loss or theft of devices containing data

Access by an unauthorised party.

Sending data to the wrong recipient.

GDPR ACCOUNTABILITY

You must be able to demonstrate compliance.

Certifications (eg ISO 27001) can help.

The device to be at, or under a threat level

Additionally, you can set a policy in Azure Active Directory to only enable computers that are domain-joined, or mobile devices that are enrolled in Intune to access Office 365 services. Intune provides device compliance policy capabilities that evaluate the compliance status of the devices. The compliance status is reported to Azure Active Directory that uses it to enforce the conditional access policy created in Azure Active Directory when the user tries to access company resources.

})(jQuery)