LEVEL 0
LEVEL 0
h-Cyber Asset
CIS Endpoint Protection Support Service

Provision of expert guidance for the implementation, configuration and management of Customer endpoint security software. This guidance is used to harden Customer CIS against attack and compromise.

The endpoint security guidance consists of the following mandatory/optional controls:

  • Endpoint antimalware
  • Host-based Intrusion Prevention (IPS)
  • Secure web-browsing
  • Desktop Firewall
  • Central management control for endpoint management
  • Removable media protection
  • USB Device Control protection
  • Data Leakage Prevention
  • Data-at-rest encryption
  • Email antimalware
  • Patch management
  • Endpoint Detection and Response
  • Rogue Systems Detection
  • Security measures that prevent unauthorized removable CIS storage media being used on the CIS
  • Secure media erasure
  • Endpoint Security Hardening Guidelines/configuration

Features

The use of deep, niche expertise to deliver guidance for the implementation, configuration and management of Customer endpoint security software.

It includes:

  • Full life cycle management for the respective endpoint security controls, ensuring the Approved Product List (APL) is updated.

  • Reviewing and adapting the recommended configuration and guidance for every new minor and major release.

  • Reviewing and adapting the guidance for every new minor and major release.

  • Providing 3rd-level technical support.

  • Assisting with vulnerability remediation, as suggested by local CIS Security Officers or revealed from a vulnerability assessment.

Added Value

We do System Hardening as a Process: The way that we deliver System Hardening services takes security and diligence to another level. Our process requires many steps, all of which are critical to the success of the hardening system to our customers. The more steps a user follows, the safer and more resilient the system will be.

Our main focus is:

  1. Saving money in the long run
    The less hardware and software running on the computer, the less money customer will have to spend in the future for updates and on expenses to remove malware in the future. Hardening also frees up more space on the computer, which means customer don’t have to buy more memory and/or disk capacity.

  2. Eliminates access points
    Removing unnecessary files, software and file sharing reduces the number of access points that a hacker can do to the system.

  3. Improves performance
    As we said before, hardening frees up disk space and memory, which is like removing the sludge from the computer. The computer will work quicker and more efficiently because it is not bogged down or struggling to operate with limited memory and space.

  4. Reduces holes in security
    Hardening adds to the various levels of security to protect users and their assets. Hardening also removes disabled files and programs that are often forgot about and provide attackers cloaked access to the system.
Looking for More Information?
Service Datasheet Download or fill the form.
Service Statistics
Number of endpoint devices protected
Number of malware blocked in endpoint devices
Request a Quote
We will get back to you as soon as possible.
* Required Field
How can we help?
Contact Us