Research from Beaming found that cyber crime cost UK business £29bn in 2016, with over 2.9 million companies (roughly one in four) affected. Such attacks cost many thousands of pounds in lost revenues, disruption, repairs and recovery. But the threat isn’t just a financial one. Cyber criminals also target your data and intellectual property, which can destroy the goodwill you have developed with your customers – not to mention a breach could lead to prosecution if you are found to be in contravention of the Data Protection Act too.
The risk to the economy in the UK is so severe that the government is investing £1.9bn into cyber security over the next five years, and has also set up the National Cyber Security Centre (NCSC) to tackle cyber crime. The message is clear: whether you are a big corporate or a startup enterprise, you are at risk from cyber-attack, and you need to act to protect yourself.
Protos Networks’ incorporates edge security, DNS layer security, anti-malware and anti-phishing technologies, Next-Generation Firewalls and other cutting-edge software as part of our industry-leading cyber security solutions, which will keep your business safe from costly and damaging breaches. We are also a Cyber Essentials Plus and IASME Gold-certified company, thus giving you peace of mind that all our products and services are of the highest possible standard.
For every device with a connection to your network, an attack path for security threats exists. That’s where endpoint security comes in, and, at Protos Networks, we integrate the products supplied by Sophos and Cisco AMP to keep you protected from breaches, infections and malware. These technologies are leaders in their field when it comes to detection, and blocking these threats at the point of entry. Yet even advanced attacks which get past this first line of defence can be identified in real time, isolated, and instantly eliminated, thus giving you unrivalled protection and control.
Next-Generation Firewalls are advanced physical or software-based security systems encompassing a range of technologies which are able to detect – and prevent – cyber-attacks against your network.
Our Next-Generation Firewalls integrate technologies such as traditional firewall services, deep packet inspection, intrusion prevention and detection, Advanced Malware Protection and content filtering. These devices can be deployed at your network-edge, or virtually in cloud environments. Protos Networks utilises the power of Cisco Meraki’s MX appliances to provide you with comprehensive network security.
Cisco Umbrella is a cloud-based cyber security technology and is the industry’s first Secure Internet Gateway. Cisco Umbrella keeps you safe from a cocktail of threats such as malware, phishing, ransomware and more. It gives you complete visibility across your entire network, pre-emptively identifies any security risks, and stops them in their tracks. And given that this is all delivered from the cloud, Cisco Umbrella enables you to monitor your network remotely, and provide instant protection for all your users.
Intrusion Prevention & Detection
Intrusion prevention/detection is a network security technology which inspects traffic flowing in and out of your network, with the aim of detecting and preventing known vulnerability exploits. Our intrusion prevention and detection technologies – powered by Cisco and Sourcefire Snort – refresh their rulesets daily to protect against the latest vulnerabilities including malware, exploits and rootkits. As our services are cloud-based, these updates are pushed out with minimal effort.
Mobile Device Management
Protos Networks’ mobile device management (MDM) solutions – powered by Cisco Meraki – enable unified management of smartphones, Macs, PCs and tablets from a centralised, secure cloud platform. They also enable seamless user enrolment, security compliance and automated device provisioning, allowing you to secure your organisation’s data and effortlessly track and troubleshoot thousands of assets.
Advanced Malware Protection
Cisco’s Advanced Malware Protection (AMP) is an industry-leading solution protecting organisations against the latest malware threats. AMP has a database of over 500 million known malware signatures, and analyses over 1.5 million new samples every day. Cisco AMP provides real-time malware blocking, retrospective malware detection and Threat Grid sandboxing technology on a global level. AMP can be deployed on endpoints and network devices, and is integrated into our Next-Generation Firewalls.
A sound cyber security strategy is not one piece of hardware or software – far from it! Robust cyber security is provided via a combination of staff awareness, resilience, policies and organisational processes.
Underpinning these, however, are technical controls. Hackers are constantly evolving, and the protection you provide to your IT devices, infrastructure and networks is a fundamental part of your cyber defence strategy. Protos Networks offers a whole host of technical controls and services to help you mitigate the risk to your systems.
We will deploy a Cisco Meraki MX edge-security appliance at your network edge. This Unified Threat Management (UTM) device offers a range of industry-leading security features such as Next-Generation Firewall services, Sourcefire Snort intrusion prevention/detection, Cisco Advanced Malware Protection (AMP), Threat Grid sandboxing, VPN services and content filtering.
As well as the edge-security appliance, we will also provision Cisco Umbrella for your organisation. Cisco Umbrella is the industry’s first Secure Internet Gateway (SIG) which extends your security far beyond the firewall. Cisco Umbrella acts as the first line of defence for your systems, pre-emptively blocking known malware and phishing domains, botnets and ransomware call-back domains.
Our ‘Extend’ package plus Sophos Endpoint Advanced security software on your client devices and servers. This cloud-managed solution allows us to keep a watch on your endpoints, offering a host of Next-Generation features such as advanced malware protection and web, application, device and data control.
As well as the packages above, we can also add bolt-on services to tailor our managed security services for your organisation. Regular vulnerability scans, Cyber Essentials or IASME Governance assessments, mobile device management, staff training, cyber insurance (coming soon) and after-care in the event of a breach are just some of the extra services we can offer.
We understand that cyber security can be daunting for many organisations. That’s why Protos Networks has developed a range of packages and bolt-on services to simplify your security strategy – whilst not compromising on quality.
Our managed service packages offer multi-layered protection for organisations of all sizes. Wrapped around these packages are bolt-on assessment and support services which give you the peace of mind that experts are managing your cyber security; utilising the latest technology and processes.
General Data Protection Regulation (GDPR) is an edict which affects any business responsible for the personal data of EU residents, with a deadline for compliance of 25 May 2018. GDPR replaces the Data Protection Directive 95/46/EC, with the intention of standardising data privacy laws across Europe.
It encompasses rules across various facets of data handling, including storage, access, consent, portability, breach notifications and more. Despite Brexit, UK firms are still required to be GDPR-ready by May 2018, and will be liable for heavy fines if they are found to be non-compliant.
Protos Networks is a certified GDPR-readiness assessor, and delivers audits to determine whether you meet these requirements. And, if it turns out that you require a guiding hand to get your ducks in a row, fear not… our team of industry experts are on hand to offer solutions tailored to your needs.
Having robust technical and organisational controls in place is great – but any organisation should be assessing these controls to ensure compliance and coherence in their cyber security strategy.
Protos Networks is an approved Cyber Essentials and IASME Governance certification body. These standards – when properly implemented – can help an organisation mitigate the risk posed by the majority of internet-based cyber-attacks. Likewise, we can also carry out vulnerability assessments on your internal and external networks to highlight any risks to your IT systems and networks.
HM Government launched the Cyber Essentials scheme in June 2014 with the primary objective of making the online space for business in the UK safer, and setting out a framework for cyber security to which organisations across all sectors can be certified against. A Cyber Essentials badge is thus the ultimate stamp of approval in the eyes of your customers that you consider cyber security to be a top priority.
Protos Networks is a Cyber Essentials Plus-certified company, meaning we have gone above and beyond the standards of basic Cyber Essentials. We are also accredited by IASME to assess and certify other organisations, and offer consulting services to help your company achieve Cyber Essentials or Cyber Essentials Plus certifications.
The IASME Governance standard is a comprehensive cyber security standard developed for SMEs, and which is also seen as an affordable and achievable alternative to ISO27001.
The standard centres around risk, and is based on international best practice. Some of the aspects included in the standard are risk assessments, staff awareness, backup systems and information security policies. Organisations also have the option of including assessment questions in order to prepare them for compliance with the forthcoming General Data Protection Regulation (GDPR).
Protos Networks can carry out scheduled or ad-hoc vulnerability assessments on your internal and external networks in order to identify vulnerabilities across servers, user devices, web applications, network devices and IoT devices.
These scans use market-leading services such as Nessus to identify software and configuration vulnerabilities on your systems – enabling you to patch them before threat actors can exploit them.