FULLY MANAGED IT & CYBERSECURITY SERVICES
Core Managed has worked in collaboration with Peak Brokerage Services to offer Fully Managed IT services to streamline IT operations. This service also includes a discounted suite of Cybersecurity tools sufficient to ensure compliance with FINRA & SEC data security regulations. Reps that choose this service participate in a streamlined version (usually less than 60 minutes) of Peak’s annual data security assessment.
Here’s what’s included:
A Dedicated Team & Direct Access:
You’ll be assigned a phone number specific to your company that allows us to identify your calls and route them directly to your dedicated team. The 1st person you talk to will be a technical resource, answering within 22 seconds on average.
Unlimited Help Desk:
24/7/365 support for the above and for user issues.
Managed Firewall:
Our team monitors firewall appliance backups, monitors for newly available firmware, and deploys new firmware after testing.
Telecommunications Management:
Our team monitors alerts and notifies you via email. Critical alerts are triaged 24/7/365.
Proactive monitoring for servers & workstations:
Our team monitors alerts and notifies you via email. Critical alerts are triaged 24/7/365.
Windows patches:
We monitor and remediate missing and failed patches daily.
3rd party patches:
We monitor and remediate missing and failed patches daily.
Cybersecurity training:
Monthly cybersecurity training. We supply the licenses, create the training cadence, administer users and create reports.
Phish Simulation:
Weekly phishing simulation emails. We supply the licenses, create the simulation cadence, administer users and create reports.
Managed Detection & Response for M365:
Threat experts monitor and respond in real time to critical security threats like suspicious login activity, email tampering and forwarding, and privilege escalation attempts to stop account takeover at the source.
Managed Endpoint Detection & Response:
Modern endpoint protection to detect threats and notify us of indicators of compromise. Includes monitoring for persistent footholds, malicious processes, Ransomware and open ports.
Managed Endpoint Detection & Response:
Modern endpoint protection to detect threats and notify us of indicators of compromise. Includes monitoring for persistent footholds, malicious processes, Ransomware and open ports.
Penetration Testing:
Our comprehensive penetration testing is designed to ensure that your organization is compliant with data security frameworks. Our testing provides the best way to identify any vulnerabilities or weaknesses in your security infrastructure before they can be exploited. We provide detailed reports and insights that can be used to ensure that your organization is meeting its compliance requirements. Includes testing for 1 site.
Vulnerability Scanning:
We’ll Identify and Remediate software and system vulnerabilities and misconfigurations. You’ll receive a report that identifies the current vulnerabilities of your endpoints and a remediation plan to quickly resolve these issues.
Security Information and event management (SIEM):
SIEM aggregates logs and event data in real time to provide threat monitoring, event correlation and incident response.
Security Operations Center (SOC):
SOC manages SIEM and responds to indicators of compromise with a 1 hour SLA 24/7/365.
Compliance Plaform Setup and Maintenance:
Our team implements and maintains Mirrorweb or alternative compliance platform.
Monthly Investment: $95/User