The NIST Cybersecurity Framework Five Functions

Our secure managed IT services follow the National Institute of Standards and Technology (NIST) framework and core functions to ensure your company has all the security options needed to mitigate risk of cyber-attacks. We institute a comprehensive layered security approach with software and functions to protect your network, servers, desktops, employees and ultimately your company.

Identify

UDNI will help you develop a cybersecurity risk appetite and maximize your cybersecurity efforts.

Protect

UDNI will ensure you have the appropriate safeguards in place to secure your critical systems.

Detect

UDNI provides the tools and staffing to continually monitor your systems for cybersecurity events.

Respond

UDNI provides proactive and responsive action to contain cybersecurity events.

Recover

UDNI works with your organization to develop a plan in order to recover from a cybersecurity event quickly.

Managed Cybersecurity & IT Support

Securing your IT systems is not optional in today’s world where small to medium sized businesses like yours are statistically targeted.

Vigilance Secure is designed to keep your technology safe while ensuring your systems and infrastructure are performing at peak levels. Included with the Vigilance Secure tool suite is proactive monitoring, maintenance and remote IT support services, minimized downtime, and performance maximization, allowing you to focus on the success of your business.

Vigilance Secure & Vigilance Secure+ IT SERVICES
inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Unlimited Helpdesk Support Services

Dedicated helpdesk support engineers provideprompt response with advanced triage procedures and essential low time to resolution goals.  Unlimited Remote Helpdesk Support (8am – 5pm; M-F).

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

vCIO Services

As part of quarterly business reviews a comprehensive CyberSecurity Risk Assessment will be completed in the environment including Network Assessment, asset analysis, event reports, user reconciliation, infrastructure consulting, service and support review, recommendations on remediation any risks identified.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Vulnerability Scans

Advanced reporting and metric scans are completed as part of the vCIO services quarterly, it is crucial to continuously identify risks within your environment to prevent gaps and remain vigilantly secure.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Network Device Management
  • Service includes threshold-based monitoring to provide notifications as network devices (Firewalls, Routers, Switches, Wireless Controllers) and services are trending toward failure.
  • Comprehensive Network Device Management for Firewalls, Routers, Switches, Wireless Controllers
  • Greater visibility into your network with Real-time topology mapping of all network assets
  • Onsite Support in the event of a Widespread Network Outage.

SECURITY MANAGEMENT:

  • User & credential management
  • Automated device configuration backup & restore for Firewalls, Routers, Switches, Wireless Controllers

Hardware firmware and software updates and patching, as needed

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Proactive Monitoring/Alerting + Patching with Managed NOC
  • Comprehensive Management, Maintenance and Proactive Technology (Workflows and Automated Scripting)
  • 24x7x365 Monitoring and Analysis
  • System Performance Monitoring, Analysis & Troubleshooting (HDD space, CPU and more)
  • Microsoft Windows Patch Management Service including Service Packs installations Tue and Sat 10pm-5am.
  • Whitelisting Microsoft security patches, so that when patches are deployed you can be confident that they won’t disrupt workflow, or create extra cycles.
inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Advanced Enterprise Endpoint Protection
  • Multi-vector protection against zero day previously unknown malware.
  • Identify “persistent foot-hold” threats.  Uploading tens of millions of lines of logs daily to a SIEM tool to find incidents in the logs. Effective lightweight methods of finding and stopping threats real time.  Features like stopping in progress ransomware encryption events, application white-listing and more. Host Lockdown, App auditing and MAC agent coming soon. Includes 24×7 Assisted Remediation from the (SOC lite) Huntress Security Operations Center. 
inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Security Awareness Training

The first line of defense in security is always ongoing comprehensive end user awareness and best practices training. Security Awareness Training includes easily understandable training for all users on your network as well as phishing and other safe malware campaigns to determine how susceptible your users are – which are then used for follow up training to continually improve. 

Includes easy reports for supervisors to confirm each user is receiving training.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Multifactor Authentication (MFA)

A password for login to your applications such as Office 365, Software as  Service applications no longer meet the security requirements and are easily hacked.  The solution is Dual Factor Authentication and Trusted Identity Management.  Something the user knows and something the user has in their possession. 

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

DNS Protection

DNS Protection continually scans and classifies billions of internet sites multiple times a day, discovers and automatically blocks hundreds of thousands new malicious sites per day.  Network security best practices are multiple layers deep and DNS Protection goes a long way in protecting each location and each device in your network from malicious sites in every day internet use.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Email Security & Protection including Continuity, Encryption, and Archiving

Inbound/outbound email filtering, continuity, Digital Link Protection email filtering, website URL Defense, email encryption for PII/HIPPA sensitive data, legal hold for compliance purposes and complete domain wide email archiving.

Includes real time business continuity for your company’s uninterrupted inbound / outbound email in the event of O365 email outage or interruption. 

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Cloud App Security

CAS secures your SaaS accounts, including Microsoft 365, Gmail, Google Drive, One Drive, Box, Dropbox and Citrix ShareFile. Its advanced ML-based anti-phishing, data leak prevention (DLP) and anomaly and fraud detection deliver advanced protection against targeted phishing, ransomware, fileless and zero-day malware, identity fraud and account takeover attacks. Also, CAS enforces consistent security policies across your SaaS environments.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

True 3rd Party Backup & Disaster Recovery (BDR)

Off site off domain: true 3rd party backup. Secure cloud backup for reliable data protection and disaster recovery

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

True 3rd Party Cloud App Backup (O365)

Backup for Microsoft O365 Exchange Email/Shared Mailboxes/OneDrive for true 3rd party business continuity / disaster recovery.  Allows end user real time access to all O365 OneDrive documents / files / folders / resources during a Microsoft O365 Outage / business interruption.

inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Advanced Enterprise Endpoint Protection with SOC
  • Enterprise-grade prevention, detection, and response across your attack surface, from endpoints and servers to mobile devices.
  • Includes full 24×7 human staffed Security Operations Center (SOC)
  • Automatically identify and protect unmanaged, network-connected endpoints that may introduce new risks.
  • Reduce false positives and increase detection efficacy consistently across OSes with an autonomous, combined EPP+EDR.
  • Remediate and rollback endpoints with a single click, reducing mean time to respond and accelerating investigation.
inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

SIEM

Environment wide Intrusion Detection System / Intrusion Prevention System (IDS/IPS) Monitoring per user. 

  • Aggregated alert analysis & response
  • Threat intelligence feeds
  • Threat visualizations and Reporting
inactive tab

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

BCDR

Business Continuity Disaster Recovery

Business Continuity – Define a process and expectation that allows for you to operate your business in the event of a disaster, this includes any process or procedure, timeframe for recovery, timeframe for defining disaster response mode, and similar. 

Disaster Recovery – Once identified you are in disaster mode you begin recovery efforts defined in your business continuity plan and work to restore services impacted.

How you do this would be discussed and defined in your business continuity plan.