We’ll store the logs from your endpoints (Windows, OSX) and Networking Devices (Firewalls etc) offsite for at least 90 days
Our automated agents will make sure that all logs are constantly being uploaded and searched for anomalies
What actually is this?
Granted, this isn’t the most interesting part of the Assurance package, but it is important. By storing the logs away from the potentially compromised device, we can look back through them should something happen. By analysing the logs, we can see what was accessed, changed or breached for at least 90 days after the initial incident. Longer terms are available upon request.
Why do I need this?
Should you suffer a breach, its your responsibility to find out what has been accessed, and to try and work out how it happened. By storing the logs for your endpoints, networking equipment and Office 365 offsite, we can look at these logs even if they’ve been cleared from the affected device or service.
Key features:
• Automated agents on your devices submit their logs to our servers
• Anomalies detected and reported to our Helpdesk to check
• 90 Days storage minimum
• Adds the ability to troubleshoot and investigate should a breach happen, or to provide to a cyber security firm should the worst happen
Other items in Assurance
Defending against today’s advanced threats requires a new approach to email security. With banners, warnings and manual checking by our support team, Ironscales’ best-in-class email security platform is powered by…
Keeper enterprise password management gives you and your team a secure place to keep their passwords. With easy to use applications and browser plugins, Keeper will create your passwords for…
Office 365 is great, but the lack of backups included is a bit scary. Our Office 365 Backup solution will take a backup daily of all of your data. It…
No matter if you’re in the office, or working on a shared WIFI, our web security firewall will keep your endpoint secure. By automatically blocking nefarious traffic, or categories that…
We spend a lot of time tracking the latest critical vulnerabilities that crop up every day. Our systems will keep your windows devices monitored in real time, and will even…
We’ll store the logs from your endpoints (Windows, OSX) and Networking Devices (Firewalls etc) offsite for at least 90 days Our automated agents will make sure that all logs are…
Cyber Essentials is a great standard that you should be looking to attain. All the tools we include with this package should allow you to pass the Cyber Essentials certification.…
Fast, efficient support from our UK based helpdesk. Unlimited user support mon-fri 8:30-17:30pm From helping getting a printer working, to setting up your new team members, think of us as…