MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

The-Ultimate-Guide-to-Success-in-Managed-IT-Services

Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

Enhancing Your Cyber Security Offering With Continuum Security

Posted June 15, 2018by Brian Downey

Enhance-Your-Security-Offering-with-Continuum-Security

IT service providers are doing business in a world where they’re struggling to protect their clients who are constantly under fire from cyber threats. The nature and sophistication of today’s attacks are forcing MSPs to deliver security in a completely different way than they’ve approached RMM and BDR. Simply put: without the right protection and preventative measures in place, clients won’t stand a chance in the ever-changing threat landscape.

To combat this challenge, Continuum made an exciting announcement yesterday—we’ve acquired CARVIR to expand our security portfolio, enabling MSPs to offer enhanced security to clients. Today, I’d like to take a deeper dive into the three core products that make up the Continuum Security portfolio.

Profile & Protect

Continuum Security Profile & Protect enables MSPs to leverage pre-existing or custom-built profiles that map to specific threat types in order to define proper security strategies for each of their clients. This allows MSPs to stop selling “security” as a broad blanket concept, and start selling targeted offerings such as ransomware protection, anti-phishing, insider threat detection and other services.

Key Features

Out-of-the-box security profiles that tell you exactly what’s needed to protect against certain threat types. These recipes identify specific gaps in protection on a client device, helping you identify potential vulnerabilities and take corrective action where needed. 

Risk scoring and alert thresholds allow you to understand gaps in protection and define acceptable risk on a per-device basis. And, tickets are only generated when a risk score exceeds its threshold, eliminating much of the clutter and white noise found in other solutions. 

Capitalize on new revenue opportunities with managed security services. Profile & Protect provides functionality that supports baseline security assessments and analyses, as well continuous monitoring and optimization, which translates into monthly recurring revenue.

Bundled Tools

With Profile & Protect, you receive two foundational security tools at no extra cost to further enhance your security offering.

Webroot SecureAnywhere DNS Protection provides enhanced endpoint protection through DNS.

Webroot Security Awareness Training provides comprehensive training courses designed to educate your clients about security awareness on an ongoing basis.

Detect & Respond – Endpoint

Continuum Security Detect & Respond - Endpoint provides fully SOC-supported endpoint monitoring and threat detection to identify active threats and remediate attacks. Powered by SentinelOne, Detect & Respond - Endpoint builds on foundational security to rapidly identify and halt even the most sophisticated attacks, minimizing harm and reducing risk to client endpoints.

Key Features

Attack forensics and intelligent automation helps you identify advanced malware, exploits and script-based stealth attacks to deliver true peace of mind to customers.

Threat detection, response and remediation from the Continuum SOC to identify and confirm malicious attacks in progress and, when discovered, activate remediation steps.

Bridge the security skills gap with the Continuum SOC acting as a direct extension of your team to help you protect all client endpoints.

Detect & Respond – Network & Compliance

Continuum Security Detect & Respond - Network & Compliance leverages industry-leading SIEM technology to collect, analyze and correlate information from network devices, endpoint logs and threat intelligence feeds. This information is used to identify security incidents, policy violations, fraudulent activity, and other threats—and when such activities are identified, the Continuum SOC quickly takes action to mitigate the attack while providing advanced remediation documentation and recommended next steps.

Key Features 

Threat monitoring and analysis provides monitoring of dozens of possible indicators of compromise, while the Continuum SOC analyzes these indicators quickly, separating legitimate events from indicators of an active threat.  

Industry-leading SIEM technology from EventTracker to identify malicious behaviors and remediate attacks within networks and endpoints, and to meet the requirements for common regulations like PCI, HIPAA and GLBA.

Preconfigured security, compliance and operations reports to meet a high standard of security and client expectations around compliance.

 

Want to see Continuum Security in action?

Explore the Power of Continuum Security

As Senior Director of Product Management at Continuum, Brian is responsible for the overall security solution strategy. He has spent the past 15 years in various product and business strategy roles at several of the world’s most successful technology companies, most recently driving the initial creation and introduction of BMC Software’s new security product line. Brian is passionate about developing and delivering solutions that allow small- and medium-sized businesses to effectively secure their environments. Brian has a computer science degree from University of Massachusetts Amherst, an M.B.A. from Babson College and is currently finishing his Doctorate in Business Administration from Temple University. Brian lives just outside Boston with his wife and three kids between the ages of three and seven.

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus