IT service providers are doing business in a world where they’re struggling to protect their clients who are constantly under fire from cyber threats. The nature and sophistication of today’s attacks are forcing MSPs to deliver security in a completely different way than they’ve approached RMM and BDR. Simply put: without the right protection and preventative measures in place, clients won’t stand a chance in the ever-changing threat landscape.
To combat this challenge, Continuum made an exciting announcement yesterday—we’ve acquired CARVIR to expand our security portfolio, enabling MSPs to offer enhanced security to clients. Today, I’d like to take a deeper dive into the three core products that make up the Continuum Security portfolio.
Profile & Protect
Continuum Security Profile & Protect enables MSPs to leverage pre-existing or custom-built profiles that map to specific threat types in order to define proper security strategies for each of their clients. This allows MSPs to stop selling “security” as a broad blanket concept, and start selling targeted offerings such as ransomware protection, anti-phishing, insider threat detection and other services.
Out-of-the-box security profiles that tell you exactly what’s needed to protect against certain threat types. These recipes identify specific gaps in protection on a client device, helping you identify potential vulnerabilities and take corrective action where needed.
Risk scoring and alert thresholds allow you to understand gaps in protection and define acceptable risk on a per-device basis. And, tickets are only generated when a risk score exceeds its threshold, eliminating much of the clutter and white noise found in other solutions.
Capitalize on new revenue opportunities with managed security services. Profile & Protect provides functionality that supports baseline security assessments and analyses, as well continuous monitoring and optimization, which translates into monthly recurring revenue.
With Profile & Protect, you receive two foundational security tools at no extra cost to further enhance your security offering.
Webroot SecureAnywhere DNS Protection provides enhanced endpoint protection through DNS.
Webroot Security Awareness Training provides comprehensive training courses designed to educate your clients about security awareness on an ongoing basis.
Detect & Respond – Endpoint
Continuum Security Detect & Respond - Endpoint provides fully SOC-supported endpoint monitoring and threat detection to identify active threats and remediate attacks. Powered by SentinelOne, Detect & Respond - Endpoint builds on foundational security to rapidly identify and halt even the most sophisticated attacks, minimizing harm and reducing risk to client endpoints.
Attack forensics and intelligent automation helps you identify advanced malware, exploits and script-based stealth attacks to deliver true peace of mind to customers.
Threat detection, response and remediation from the Continuum SOC to identify and confirm malicious attacks in progress and, when discovered, activate remediation steps.
Bridge the security skills gap with the Continuum SOC acting as a direct extension of your team to help you protect all client endpoints.
Detect & Respond – Network & Compliance
Continuum Security Detect & Respond - Network & Compliance leverages industry-leading SIEM technology to collect, analyze and correlate information from network devices, endpoint logs and threat intelligence feeds. This information is used to identify security incidents, policy violations, fraudulent activity, and other threats—and when such activities are identified, the Continuum SOC quickly takes action to mitigate the attack while providing advanced remediation documentation and recommended next steps.
Threat monitoring and analysis provides monitoring of dozens of possible indicators of compromise, while the Continuum SOC analyzes these indicators quickly, separating legitimate events from indicators of an active threat.
Industry-leading SIEM technology from EventTracker to identify malicious behaviors and remediate attacks within networks and endpoints, and to meet the requirements for common regulations like PCI, HIPAA and GLBA.
Preconfigured security, compliance and operations reports to meet a high standard of security and client expectations around compliance.
Want to see Continuum Security in action?
By Lily Teplow
By Gretchen Hoffman
By Gretchen Hoffman