Advanced Endpoint Protection (AEP)
Advanced Endpoint Protection (AEP) is next-generation antivirus protection that leverages artificial intelligence and machine learning to identify malware before it executes. Traditional antivirus protection depends on signatures to detect and block malicious applications on the endpoint. AEP blocks malicious behavior rather than relying on signatures. While this service can replace traditional antivirus programs, it is a standalone application that may be used to complement existing, installed antivirus programs.
Anti-Phishing / Security Awareness Training (SAT)
Anti-phishing training provides employees with examples of how to spot phishing attempts and suspicious emails requesting sensitive information from users or infecting systems with malware. This includes sending emails to employees with fake links, mimicking real phishing attempts from outside threats. Employees who click on simulated links will be prompted to complete security awareness training.
Phishing, and other attacks requiring human interaction, are the most common causes of cybersecurity incidents; therefore, it is crucial for individual users to have the knowledge and resources to avoid falling victim to phishing attempts that can cause catastrophic damage to government entities, communities and citizens.
Security Awareness Training (SAT) features user-friendly online training courses that cover the latest cybersecurity best practices to educate employees on how to keep data and devices safe.
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA) is a security system that requires more than one method of authentication to verify a user's identity for a login or other transaction. Categories for authentication may include knowledge (something a user knows), possession (something a user has), and inherence (something a user is). MFA provides an extra layer of security to prevent unauthorized access to systems.
Web Application Firewall (WAF)
Web Application Firewall (WAF) is an application firewall for HTTP applications. It applies a set of policies to help protect web applications from common web exploits that could affect an application’s availability and compromise data.