We help you choose the right End Point Security solutions to defend your business assets.
End Point protection keep your business safe from most known and new threats. Your security suite should be both comprehensive and easy to manage across all of your devices.
Common End Point Security Solutions include:
- Email Scanning Software targeting Ransomware
- Security Awareness Training for all staff, to ensure that you are reducing your user risk, which works in tandem with your software-based IT security solutions
A reliable and comprehensive Anti-Virus software is our first line of defense when we work with new clients to ensure they have the strongest chance of withstanding attacks from viruses and malware. We’ve been selling anti-virus software for over twenty years. It’s an important precaution and one we take very seriously.
Webroot Secure Anywhere Anti-Virus is our software of choice, and this is why:
- Webroot is the fastest to install, fastest to scan and takes up the least hard disk space on your machines
- Webroot uses 11x less memory when idle than the closest competitor.
To see the Pass Mark 2014 Anti-Virus Performance Benchmark Report – click here. It compares 6 Anti-Virus products, looking at 13 metrics like Installation Time, Installation Size, Boot Time, Scheduled Scan Time, Memory Usage during Initial Scan and many more.
What is ransomware and how can you protect your business?
Even with the best Anti-Virus software installed, there is a small chance for malware to slip through - threats to end point devices have vastly increased and diversified, and we highly recommend taking additional steps to protect
Where an anti-virus software used to suffice, we are now seeing an inundation of ransomware, like ‘Cryptolocker’, that is infecting computers and the networks to which they are connected. It is at a point where it is not a question of 'if' you get ‘Cryptolocker’, but when. Phishing attempts are becoming very professional.
The most vulnerable point to ransomware is email. Unexpected mail should never be opened, but always deleted. These malicious emails are coming in the form of bills, invoices, deliveries, fines and come from a variety of legitimate-looking senders.
AGL, Australia Post and the ATO are three organisations that have been fraudulently impersonated. If you or a user at your site receive a bill or official-looking email from either of these organisations that is not expected, delete it. If it is a legitimate communication, the organisation will follow you up.
Trustwave Secure Email Gateway
We recommend scanning software Trustwave Standard, which is a secure email gateway that incorporates industry-leading web threat intelligence to effectively target emails that contain malicious URLs and deliver real-time, zero-day protection against the latest email-borne threats.
Using proprietary technologies, SpamProfilter, SpamBotsensor and Spam Censor, you can experience a consistent 99.5% spam catch rate with near zero false positives – all with no special tuning.
Trustwave Advanced utilises all of the Standard features plus a blended threat module: it rewrites URLs embedded in emails to route them through a cloud-based instance of Trustwave Secure Web Gateway to protect against malware and phishing attacks in real-time for any device. With attackers compromising URLs sometimes days after sending the malicious email, it is imperative to scan embedded URLs each and every time the URL is clicked.
The Trustwave Advanced product ensures that even when you click on URLs in emails from a mobile device, you are protected. The product works with both on-premise SEG and SEG Cloud through a completely cloud-based infrastructure. Find more details about Trustwave Secure Email Gateway on the datasheet below:
For more information about security solutions, call us on 3340 5555 or use the contact form and we will have a team member return your enquiry within 3 business hours.