• 1300 151 259
  • info@endpointsecurity.com.au

Follow Us

Products & Services

Consulting

Border Line

Endpoint Security leverages our deep partnership with Quantei to expertly deliver their comprehensive suite of Consulting Services to the Australian market. With cyber-attacks and data breaches costing SME’s millions every year, cybersecurity is at the top of mind for all business owners. While most business owners are not cybersecurity experts, the team at Endpoint Security have decades of cumulative cybersecurity experience, helping our customers understand information risk, assess their security posture and effectively plan mitigation pathways.

We provide comprehensive consulting services in the following domains:

  • Information Security Management, Governance and Risk Management
  • Security Strategy and Management
  • Program and Project Management
  • Incident Management
  • Compliance
  • GDPR
  • HIPAA
  • Social Engineering
  • Forensics
  • Malware Analysis and Reverse Engineering
  • Web and Mobile Application Security Testing
  • Network Penetration Testing
  • Infrastructure Penetration Testing

Endpoint Security recognises that for any consulting service to be successful, the process, findings, analysis and outcomes must be understandable, actionable and appropriate for your business.

Endpoint Security and Quantei will provide you with:

Border Line

  • A presentation summarising our findings
  • A comprehensive executive summary detailing the most significant findings, conclusions and actionable recommendations
  • Technical documentation backing the engagement. This is provided in order to provide your technical team with the information they need to remediate, action or validate any of our findings.

The Cyber Risk Assessment Program, An Exceedingly Effective Vulnerability Assessment and Penetration Testing Program (VAPT)

The Cyber Risk Assessment Program (CRA) delivers essential insights to the cyber risk position of your organisation, breadth of current controls in place as well as their effectiveness. The CRA assesses how your business would deal with an emulated cyber-attack, using the same tools and tactics potential criminals would employ against you. Fortunately, we are doing this proactively and from your side, necessarily exposing potential weaknesses in processes, technology and people.

The CRA has consistently delivered results that exceed traditional vulnerability exercises (VAPT). How? By collecting and analysing data from a wide range of internal and external sources, identifying any statistical anomalies and tracking suspicious behaviour. Given every business and technology environment is unique, Endpoint Security and Quantei will collaborate with your internal teams to learn your information technology architecture, network topology and other notable systems that comprise your cyber environment.

While we’ll work with your team, we stay independent in order to deliver the unbiased, actionable results you’re after. Our extensive experience across a multitude of customer environments, industries and geographies enhances the value of our consulting suite, conveniently packaged and delivered through the trusted Cyber Risk Assessment Program.

The IntegrityCloud Defence System

Border Line

The IntegrityCloud Defence System is Quantei’s flagship, end-to-end security platform. They’ve blended world-class cyber protection technologies to deliver a complete attack coverage solution with automated threat prevention, detection and response capabilities. Endpoint Security is proud to deliver this product to deliver a comprehensive security toolset for our customers, including:

Managed Protection

IntegrityCloud is a complete managed security service and covers the entire protection cycle. Privacy and compliance for multiple attack surfaces, with specific solutions tailored for a number of industries. It’s delivered through a simple, subscription-based service that is continually available to provide you with best-in-class cybersecurity and support.

Engagement and Advocacy

IntegrityCloud is more than just a product, it’s a holistic service. Endpoint Security delivers exemplary customer service through a dedicated Customer Engagement Manager (CEM) that will be assigned to your account at no additional cost. In addition to ensuring you receive the highest returns on your cybersecurity investment and get the most out of our products, your CEM will also be available for continuous 24×7 coverage during any security incidents.

Continuous Threat Management

Commander is our exclusive 24×7 Detection, Response and Advisory service, delivered by Quantei’s Global Threat Management and Research team. SLA-backed security coverage is included with every IntegrityCloud product, at no additional cost. Commander delivers a singular, integrated managed visibility, detection and response service.

Protection for Users, Devices, Servers and Cloud

Border Line

For targeted back-end cybersecurity, Endpoint Security utilises Quantei’sIntegrityCloud product suite.

IntegrityCloud Endpoint

Quantei’sIntegrityCloud Endpoint family is built on BlackBerry’s CylancePROTECT and CylanceOPTICS, the proven Artificial Intelligence and Machine Learning based modern endpoint security solution that blocks emerging threats on average 25 months before they are first detected in the wild. They’ve stopped tens of millions of potential attacks with a system that is continually learning and getting better.

IntegrityCloud Unified Device Management

As new device types proliferate, the lines between them are blurring. How do businesses and IT administrators maintain control? A comprehensive Unified Endpoint Management strategy lays the essential foundation to secure business devices. IntegrityCloud Unified Endpoint Management securely enables the Internet of Things with complete endpoint management and policy control for your diverse and growing fleet of devices and apps.

IntegrityCloud Behaviours

A comprehensive solution for detecting Insider Threat, Fraud, User Activity Monitoring, Privileged User Monitoring and Endpoint Forensics. IntegrityCloud Behaviours is built on Dtex UEBA to provide unparalleled insights into user behaviour, privilege exercises and suspicious activity by providing complete context and activity around a security event, constructing a full audit trail of the incident and answering important questions in minutes, not days.

Protection For Websites

Border Line

IntegrityCloud Delivery

Web application attacks can deny services and steal sensitive data. Quantei’sIntegrityCloud Delivery delivers comprehensive protection against the most critical security risks to applications and service infrastructure. It incorporates Web Application Firewall (WAF), Distributed Denial of Service (DDoS) protection and Content Delivery Network (CDN) from Imperva, the global leader in application security.

Protection For Network and Infrastructure

Border Line

IntegrityCloud Delivery DDoS for Networks, DNS and Single IP

IntegrityCloud Delivery for Networks safeguards critical network assets through DDoS mitigation for any application or underlying server infrastructure. DDoS protection for networks supports any type of service, including TCP, UDP, SMTP, FTP, SSH, VoIP and proprietary or custom protocols. The solution shields entire networks by leveraging Quantei’s global network, featuring multi-terabit scrubbing capacity and high-capacity packet processing capabilities to instantly mitigate the largest, most sophisticated DDoS attacks.

Threat Management

Border Line

Commander

Border Line

Our exclusive 24×7 Detection, Response and Advisory service, delivered by Quantei’s Global Threat Management and Research team. SLA-backed security coverage is included with every IntegrityCloud product, at no additional cost. Commander delivers a singular, integrated managed visibility, detection and response service.

Commander Carbon Incident Response

Border Line

The Commander Carbon team can be deployed on-site during critical incidents for contextual awareness, even closer engagement and rapid resolution. This on-demand service helps manage the entire threat response lifecycle promptly and professionally, ensuring continuity for your business.

SSL/TLS Certificates

Border Line

Through our partnership with Quantei, Endpoint Security is able to offer a suite of SSL/TLS Certificates and Digital Identity Solutions for Authentication and Public Key Infrastructure (PKI).

As a DigiCert Certified Partner, Quantei fulfils the entire range of SSL/TLS certificate products:

  • DigiCert SSL Plus, SSL Plus EV and SSL Plus Wildcard
  • QuickSSL and QuickSSL Premium
  • RapidSSL and RapidSSL Wildcard
  • Symantec Secure Site, Secure Site Pro, Secure Site with EV and Secure Site Pro with EV
  • SSL Liteand SSL Lite Wildcard
  • Thawte SSL Web Server Certificate, SSL Web Server Certificate Wildcard and SSL Web Server Certificate with EV

Technical Support

Border Line

As your business deploys and operationalises technology services, IT departments and help-desks can often struggle to keep up with maintaining adequate advice. As your business needs and the cyber protection footprint grows, you’ll need dependable support that converges strong expertise with availability around the clock.

Endpoint Security is able to leverage Quantei’sRoundTheClock Technical Support program, offering comprehensive support for our customers. Customers receive 24×7 priority support and escalation, quarterly service reviews, and regular technical recommendations. RoundTheClock customers also receive proactive advisories via email and SMS for high severity alerts.