SECURITY

SIMPLIFY SECURE SECURITY PACKAGES

SIMPLIFY SECURE ESSENTIALS

Our basic yet still powerful level of security with the all the essentials covered, including Next Generation Email Security, Microsoft 365 Backup and Recovery, Quarterly Reporting and Desktop Support when you need it.

SIMPLIFY SECURE STANDARD

Our mid tier level of security featuring a comprehensive suite of powerful solutions, including: Next Generation Email Security, Microsoft 365 Backup and Recovery, Multifactor Authentication protection, Advanced Endpoint Security, Security Awareness Training, Monthly Reporting and Desktop Support.

SIMPLIFY SECURE

PLUS

Our highest tier level of security featuring a complete array of security solutions, including: Next Generation Email Security, Microsoft 365 Backup and Recovery, Multifactor Authentication protection, SASE / Cloud Security, Advanced Endpoint Security, Security Awareness Training, Monthly Reporting and Desktop Support.

ESSENTIALS STANDARD PLUS
Anti-Virus (Email) ✔️ ✔️ ✔️
Spam Filtering ✔️ ✔️ ✔️
Reporting ✔️ ✔️ ✔️
Content Filtering ✔️ ✔️ ✔️
Outbound Filtering ✔️ ✔️ ✔️
Impostor Email Protection ✔️ ✔️ ✔️
Data Loss Prevention ✔️ ✔️ ✔️
URL Defence (Sandboxing) ✔️ ✔️ ✔️
Attachment Defence (Reputation) ✔️ ✔️ ✔️
Attachment Defence (Sandboxing) ✔️ ✔️
Email Encryption ✔️ ✔️
Social Media Account Protection ✔️ ✔️
Emergency Inbox 30 Days 30 Days 30 Days
Email Spooling 30 Days 30 Days 30 Days
Instant Replay 30 Days 30 Days 30 Days
Tamper Proof and Offsite ✔️
Search and eDiscovery ✔️
Unlimited Storage (10 year Archive) ✔️
Multi-Level Logins ✔️ ✔️ ✔️
Domain Management ✔️ ✔️ ✔️
Email Logs ✔️ ✔️ ✔️
Active Directory Sync ✔️ ✔️ ✔️
Microsoft 365 Backup & Recovery ✔️ ✔️ ✔️
Multifactor Zero Trust Authentication ✔️ ✔️
Integrated Cloud Security / SASE ✔️
Advanced Endpoint Security ✔️ ✔️
Security Awareness Training ✔️ ✔️
Reporting Quarterly Monthly Monthly

NEXT GENERATION EMAIL SECURITY

Our next generation email security solution helps you protect your people from malware-based threats like malicious attachments or links and from malware-free threats like email fraud or credential phishing emails. Built-in data loss prevention identifies sensitive information being sent in email, and its email continuity helps keep your business communications up and running at all times.


In terms of security you get:

  • Anti Virus (Email)
  • Spam Filtering
  • Reporting
  • Content Filtering
  • Outbound Filtering
  • Impostor Email Protection
  • Data Loss Prevention
  • URL Defence (Sandboxing)
  • Attachment Defence (Reputation)
  • Attachment Defence (Sandboxing)
  • Email Encryption
  • Social Media Account Protection


In terms of continuity you get:

  • Emergency Inbox (30 Days)
  • Email Spooling (30 Days)
  • Instant Replay (30 Days)


In terms of archive you get:

  • Tamper-Proof and Offsite
  • Search and eDiscovery
  • Unlimited Storage (10 year archive)


In terms of management you get:

  • Multi-Level Logins
  • Domain Management
  • Email Logs
  • Active Directory Sync


Please check which of these is covered in each package in the table above.

MICROSOFT 365 BACKUP AND RECOVERY

We offer the industry's most complete cloud-to-cloud backup solution for Microsoft 365. With unlimited, automated backups, and secure storage in dedicated cloud storage or your own cloud. You just decide how much to recover, and when. On-demand and granular, item-level restore provides anytime access for your business-critical emails, files, conversations, recordings, projects, tasks, Groups, Teams, Planner, Yammer communities, Power Platform services, and sites. Help connect your users with their lost content by automating restores with a dedicated Virtual Assistant.


  • Comprehensive Backup
    An unlimited backup service for your Microsoft 365 assets in SharePoint Online, Exchange Online, Project Online, OneDrive for Business, Groups, Teams, Planner, Public Folders, Power Automate, and Power Platform.
  • Recover in Minutes, Not Days
    Without having to pick up the phone, schedule restore windows, or perform site-level rollback, easily restore your Microsoft 365 artifacts for sites, libraries, OneDrive, mailboxes, Groups, or Teams.
  • Worry-Free Backup
    We run automatic backups up to four times a day and retain 100% of your data for one year. Unlimited backup subscriptions give you the flexibility you need, and the protection you want.
  • Your Backup, Your Terms
    Choose to securely store your Microsoft 365 backup data in our scalable cloud storage, your private cloud, or in a data centre with the vendor of your choice. 

MULTIFACTOR ZERO TRUST AUTHENTICATION

Passwords and even basic Multi-Factor Authentication (MFA) aren’t enough to keep you safe from today’s dangerously creative attackers. Our Zero Trust Solution gives you the extra layers of protection you need for secure access management.


Strong MFA Security that Doesn't Sacrifice Productivity. With Simplify Secure, you can have both, in a platform that integrates across your entire ecosystem. Every user, every device, no exceptions.


  • Have It All
    Simplify Secure delivers peace of mind with strong security and increased productivity at an unmatched value.
  • Speed to Security
    Reduce friction and automate processes so that end-users and administrators can focus their time on moving your business forward.
  • Next Level MFA
    Simplify Secure continues to pioneer MFA-approaches that keep your business a step ahead of the next threat.
  • Protection and Productivity
    Our Risk-Based Authentication reduces the burden placed on users so they can verify their identity quickly and get back to the task at hand.
  • Complete Coverage
    Close the gap on your security perimeter and bring every user and every device under one secure roof.

INTEGRATED CLOUD SECURITY / SASE

Passwords and even basic Multi-Factor Authentication (MFA) aren’t enough to keep you safe from today’s dangerously creative attackers. Our Zero Trust Solution gives you the extra layers of protection you need for secure access management.


Strong MFA Security that Doesn't Sacrifice Productivity. With Simplify Secure, you can have both, in a platform that integrates across your entire ecosystem. Every user, every device, no exceptions.


  • DNS-layer security
    DNS-layer security provides the fastest, easiest way to improve your security. It helps improve security visibility, detect compromised systems, and protect your users on and off the network by stopping threats over any port or protocol before they reach your network or endpoints.


  • Secure web gateway
    The secure web gateway logs and inspects web traffic for full visibility, URL and application controls, and protection against malware. Use IPsec tunnels, PAC files, or proxy chaining to forward traffic to our cloud-based proxy to enforce acceptable use policies and block advanced threats.


  • Firewall
    The firewall logs all activity and blocks unwanted traffic using IP, port, and protocol rules. To forward traffic, simply configure an IPsec tunnel from any network device. As new tunnels are created, policies are automatically applied for easy setup and consistent enforcement everywhere.


  • Cloud Access Security Broker
    This powerful solution exposes shadow IT by providing the ability to detect and report on cloud applications in use across your organisation. For discovered apps, view details on the risk level and block or control usage to better manage cloud adoption and reduce risk.

  • Interactive threat intelligence
    Our unique view of the internet gives us unprecedented insight into malicious domains, IPs, and URLs. Available via a console and API, Umbrella Investigate provides real-time context on malware, phishing, botnets, trojans and other threats enabling faster incident investigation and response.


  • Integration with SD‑WAN
    SD‑WAN integration deploys easily across your network for powerful cloud security and protection against internet threats. Our integrated approach secures cloud access and efficiently protects your branch users, connected devices, and app usage from all direct internet access breakouts.

ADVANCED ENDPOINT SECURITY

The sooner threats are detected, the faster businesses can recover. Our Next Generation Endpoint Security Solution offers advanced endpoint protection across control points, enabling your business to stay resilient.


  • Powerful EDR capabilities
    Stop threats with built-in or completely managed endpoint detection and response (EDR), threat hunting and integrated risk-based vulnerability management from Kenna Security.

  • Streamlined investigations, faster response
    Time spent on complex investigations is time lost. Get the answers you need about your endpoints – quickly – with our Orbital Advanced Search capability.

  • Integrated XDR capabilities
    You get a unified view, simplified incident management and automated playbooks with our built-in SecureX platform, making our extended detection and response (XDR) the broadest in the industry.

  • Built-in SecureX threat hunting
    A resilient business is proactive. Thwart attacks before they cause damage, while also preparing for the future, with our human-driven threat hunting that maps to the MITRE ATT&CK framework.


SECURITY AWARENESS TRAINING

Our security awareness training solutions engage your end users and arm them against real-world cyber attacks, using personalised training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help deliver the right training to the right people at the right time. Turn your end users into a strong last line of defense against phishing and other cyber attacks.


  • Assess End User Risks
    Assess end-user vulnerability to the latest phishing threats using email templates based on real-world attacks identified through our world class threat intelligence.

    Assess users’ security awareness knowledge with our powerful end-to-end knowledge assessment tool. Choose from 230+ built-in questions and 12 predefined assessments or create custom questions and assessments to gauge understanding of your organization’s policies and procedures.


  • Train and Engage Employees
    Interactive Training: Train the right users using auto-enrolment from failed phishing simulations or knowledge assessments.

    Awareness Videos and Materials: Keep employees engaged with content that offers consistent, actionable messaging in a wide variety of formats.

    Customisation: Our self-service Customization Centre gives administrators the ability to change training content to reflect the unique needs of their organisations.


There's also a number of tools for your users to report phishing attempts and stop active attacks. There's also analysis tools to measure the performance of your users and measure risk.

REPORTING

A detailed report on the status and performance of your security infrastructure is provided every quarter or month depending on your package.

GET IN TOUCH

If you're interested in these security packages and want some more info, discuss pricing or get some advice, please get in touch today for a chat.


Just pop some details into the form opposite, give us a call, or drop us an email.


Phone: 0345 1243 441

Email: sales@simplifyit.co.uk

Request a call back

Share by: