A key component of any strategic planning is cybersecurity. Depending on the nature of your industry and the level of risk you are willing to accept, you may have different cybersecurity demands. For instance, a bank’s minimum security requirements are substantially different from those of handcrafted jewelry, a company that sells primarily on Etsy. To accommodate our clients’ diverse demands, IVT Consultants provides three cybersecurity packages with a range of add-on options.
For all clients of IVT Consultants Minimal security measures are advised. EDR (Endpoint Detection and Response) for all computers and servers are monitored.
Perfect for a typical small to the medium-sized corporation. Uses a fully Managed Detection and Response (MDR) solution in place of automatic endpoint security. Managed by a US-based Security Operations Center open around-the-clock (SOC). Provides each user with access to a secure password manager.
Designed for companies that place the highest priority on security as well as those operating in sectors subject to strict security compliance rules. Adds Vulnerability Management in addition to the Essential package to guarantee that programs and applications are free of exploitable vulnerabilities.
You get the following with IVT Consultants managed security awareness program:
Dark Web Monitoring
Before a breach happens, find out if your credentials have been compromised.
One of the simplest ways to drastically lower your security risks is to use two-factor authentication (2FA), also known as multi-factor authentication (MFA).
In fact, 2FA is now required by many cyber insurance providers, at the very least for the most exposed areas of your network.
Managed 2FA consists of:
Ensure that only your intended recipient views the contents of your email. Encryption is an excellent idea to protect things like trade secrets and customer information you may send in emails.
Additionally, many compliance regulations require encryption for emails containing personally identifiable information (PII) or protected health information (PHI).
Your cybersecurity needs depend on your industry and risk tolerance. Your account manager will work with you to select solutions that keep your business protected and compliant. This chart shows you the investments associated with various levels of cybersecurity.
|Fully Managed Services||Co-Managed Services|
|Monitoring & Support Per Workstation||$110||$10 - $110+ based on scope|
|Berglunds snabbköp||Christina Berglund||Sweden|
|Centro comercial Moctezuma||Francisco Chang||Mexico|
|Ernst Handel||Roland Mendel||Austria|
|Island Trading||Helen Bennett||UK|
|Königlich Essen||Philip Cramer||Germany|
|Laughing Bacchus Winecellars||Yoshi Tannamuri||Canada|
|Magazzini Alimentari Riuniti||Giovanni Rovelli||Italy|
|Paris spécialités||Marie Bertrand||France|
We do our best to address emergencies immediately. However, customers with an active service contract and SLA are our highest priority. Call the help desk at 301.739.7445 to find out when the next qualified tech is available to assist you. Your tech will be scheduled as soon as your payment is processed.
We can't guarantee issue resolution on networks we aren't currently managing. We do our best to at least get you operational again, or identify a fix. However, we can't replace equipment or make significant changes to your infrastructure without a support contract.
You can, but we don't recommend it unless we've already been discussing a support contract. It's never a good idea to make a long-term commitment while you're in a crisis. Plus, a trial is usually the fastest way to get same day service.
We will credit the full amount paid for your trial if you sign a service contract within 30 days.
Your trial hours expire after 90 days.
No. We do our best work when we establish long-term partnerships with clients. We are not the best fit for you if you've used a 5-hour trial in the past and decided not to move forward with a managed service contract.