Cyber Defence

Shields up!

SECURITY SUITE OVERVIEW

Enhanced security solutions provided by industry leaders should not be afterthoughts and add-ons.  Rock Solid protects our clients by including these solutions as part of our Rock Solid Infinity Plan.

VULNERABILITY MANAGEMENT

Rock Solid uses the industry leading, multi-faceted system that identifies software with vulnerabilities and automatically patches them.  It also reports on key security details such as drive encryption, use of MFA, user accounts that have too much power, end of life operating systems, and more.

PENETRATION TESTING

Penetration testing serves as a pro-active measure to try identify vulnerabilities in services and organizations before other attackers can.  We regularly scan your internal network as well as any exposed surfaces and ensure that any vulnerabilities are eliminated.

SECURITY AWARENESS TRAINING

The greatest threat to security is an organizations’ staff.  Keep them trained and ensure they are gaining the knowledge and skills they need through user testing and reporting.

COMPLIANCE MANAGEMENT

A complete list of best practices and standards have been developed by our team based on industry performance and security standards.  Our team monitors for misalignments so that we can keep your systems safe, stable, and performing well.

ENDPOINT DETECTION & RESPONSE

Not only is it required by most Cyber insurance providers, Endpoint Detection and Response (EDR) actively keeps threats from spreading.

The EDR solution Rock Solid employs takes it even further by enlisting a Security Operations Centre (SOC) staffed by security experts.  Critical events result in system isolation and immediate communication to our team so that a rapid response plan is enacted.

BACKUP AND DISASTER RECOVERY

All servers and crucial workstations are protected with hourly backups that are kept onsite for quick recovery, and offsite backups are isolated to ensure they are not affected by anything in the production environment.  These backups can be used to recover files or complete systems.  They are vigorously monitored and tested.