BREACH PREVENTION PLATFORM
Continuous Monitoring Equals
Why the Breach Prevention Platform (BPP)?
Now that you’ve performed a baseline assessment on your client, it’s time to provide remediation for the identified risks and position those risks to sell additional security services. This per-client upgrade provides continuous education and monitoring to keep security top-of-mind and help strengthen the weakest links, before it’s too late.
All it takes is one employee to cause a data breach
Cybercriminals are diligent in finding new, sophisticated methods to trick unsuspecting individuals into putting themselves at risk. Having a proactive approach is key in a robust security culture and our Employee Vulnerability Assessment is just the tool you need to help defend your clients' weakest links.
Real-time monitoring and management
Continuity is key for retention. Our Dark Web Monitoring, AutoPhish (unlimited, automated campaigns), annual training course, and weekly micro-training quizzes are all summarized into our real-time Employee Vulnerability Assessment dashboard, allowing convenient monitoring of your users.
EVA: The Heart of the BPP
EVA combines proven security metrics with quantitative analysis and friendly competition. Clients can watch as you strengthen their weakest employees into their strongest defenses.
How Does it Work?
EVA provides unparalleled insight into an organization's first layer of defense, their employees, by combining key security metrics with friendly competition.
Employee Secure Score (ESS)
Which employee is the weakest link?
The ESS uses a sophisticated algorithm of metrics to transform end-user education into an analytical engine. By assigning an ESS to each user, employees can see where they fall in their peer group and in what areas they can improve.
Company Overall ESS
How will you reduce their risk level?
By averaging all end-users' ESS, each organization is assigned a Company Overall ESS. Leveraging this score gives management insight into their overall security hygiene and highlights the need for technical safeguards.
End-User Education, Evolved
Training, Phishing, Dark Web, Security Policies, & an Interactive Portal - we cover it all.
Best MSP-Focused All-In-One End-User Education
A recent study revealed that 48% of hackers and incident responders spend 1-5 hours per week keeping up with security news, trends, and technologies, so why aren't we educating our clients' employees more than once a year?
The Nuix 2018 Black Report
Dark Web Monitoring
Proactively monitor the dark web for compromised account data. The sooner end-users are notified of a breach, the sooner they can change their passwords. End-users also have the ability to scan the dark web for their personal, friends, and family accounts with no limit.
Unlimited, automated campaigns
Routine simulated phishing has been proven to minimize the risk of end-users falling victim to a malicious phishing attempt. Routine phishing instills into our users the very behaviors of IT professionals before they click on any link so that even on the most chaotic of days, they're ready.
Weekly micro-training video, quiz & monthly security newsletter
Weekly 2-minute micro-training video & short quiz combined with a monthly security newsletter keep cybersecurity short, engaging, and interactive. White-labeled emails sent on your behalf to all your users means hands-off management.
Written Security Policies
Security policies are key to establishing expectations and explaining repercussions to protect your client organizations. Our document management portal contains a variety of customizable security policies from BYOD to Security Incident Response.
For end-users, an interactive leaderboard ignites friendly competition with just their screen name's honor at stake. For managers, employee names are featured, with a report for performance evaluations, they can track just who needs more time bulking up!
Security Risk Assessment
Identify the security gaps
EVA identifies the human vulnerabilities and their related risks. Based on NIST standards, our Security Risk Assessment (SRA) assesses your client's administrative, physical, and technical vulnerabilities; identifies the associated risks, and provides recommendations for improvement.