Protecting sensitive and confidential business data should be a primary mission of all businesses in today’s environment ……..

  • Regardless of where the data resides
    • Servers
    • Personal Devices
    • The Cloud
  • Regardless of the type of threat:
    • Virus / Malware Intrusions
    • Ransomware Attacks
    • Disasters – Natural / Man-made
    • Phishing Attacks

To help combat the ongoing battle against cybercriminals, Qnectus has developed a comprehensive Security Suite that works to help keep your critical data safe and allow you to focus on your core business. Our Senior System Engineers will customize the ultimate set of capabilities to address your specific security needs and budget. Key features in our Suite are as follows:

Virus and Malware Protection Services

Keeping your software safe from external threats like viruses and malware is essential to the integrity of your operations. After a thorough assessment of your systems, software, and data, the Qnectus team will propose a customized protection plan to safeguard your most precious information. Armed with an intimate knowledge of your infrastructure, our team is ideally positioned to provide swift and efficient on-call service to remediate issues and eliminate impending threats. In the ever-changing landscape of virus and malware protection, having a team of professionals dedicated to proactively safeguarding your infrastructure and data and mitigating risk serves as a strategic and worthwhile investment.

Email Security

Enhanced Email Security

Email is mission critical to every business and organization; however, it also serves as the #1 source for cyber-attacks, including ransomware and Business Email Compromise (BEC).
Qnectus Email Security is platform agnostic and protects Microsoft Exchange™, Microsoft Office 365, Gmail™ and other hosted and on-premises email solutions. Qnectus Enhanced Email Security solution uses an optimum blend of cross-generational threat techniques, like machine learning, sandbox analysis, data loss prevention (DLP), and other methods to deliver 24×7 protection as follows:

  • Minimizes phishing and spam
    • Examines the authenticity and reputation of the email sender to screen out malicious senders.
    • Analyzes email content using a variety of techniques to filter out spam and phishing.
  • Detects and blocks advanced threats
    • Detects and blocks ransomware and other types of zero-day malware using pre-execution machine learning, macro analysis, exploit detection, and dynamic sandbox analysis for files and URLs.
    • Shares threat information with other security layers to guard against persistent and targeted attacks
  • Protects against BEC
    • Examines email behavior (an unsecure email provider, forged domain), intention (financial implication, urgency, or a call to action), and authorship (writing style).
    • Allows you to have the flexibility to define your organization’s high-profile users list for BEC protection.

Business Continuity and Disaster Recovery (BCDR)

Disasters happen! How will your business recover when catastrophe strikes? Whether the crisis stems from ransomware attacks, natural disasters, system outages or even human error, the Qnectus team can enable your business to retrieve lost data and restore operations in a smooth and expeditious fashion. Your dedicated Qnectus team will leverage their in-depth knowledge of your infrastructure and business operations to implement a BCDR strategy that 1) ensures all of your critical data is safely and routinely backed up and 2) minimizes damage and possible downtime when an emergency occurs.

The key element of this program to help keep your day-to-day operations on-line and accelerate restoration in worst case scenarios, is the Qnectus x360Recover Solution. x360Recover is the most cost-effective BCDR solution for SMBs with a simple mission: Keep Business Running. The x360Recover platform will constantly back-up your on-premises servers to replicate your entire local IT environment and applications in the Cloud. Then, in the event that you experience any service impacting outages or data deletions from natural or man-made events or a ransomware attack, our team will remotely ‘failover’ the impacted server(s) to the Cloud to get your operations ‘up and running.’ The most critical performance objectives to delivering unparalleled restoral capabilities are as follows:

  • Recovery Time Objective RTO) for full restoration: < 1 Hour.
  • Recovery Point Objective (RPO) for potentially lost data: 15 Minutes

Our proprietary safety archive ensures ransomware protection in the case of malware by differentiating requests to delete data from the mechanics of the actual data deletion. Our innovative Direct-to-Cloud approach provides appliance-free BCDR when local failover is not an essential requirement. Thus, removing another point of physical failure that requires continuous maintenance. x360Recover also provides unlimited storage and retention regardless of the size of your infrastructreX360Recover is also equally effective for backup and restoral of computers.

Multi-Factor Authentication

Multi-Factor Authentication

Multi-Factor Authentication (MFA) is the process of identifying users by validating more than one “factor” that is unique to that user. This authentication factor serves as a credential used to verify the identity of a person, entity, or system. MFA adds an additional layer of protection and security over general authentication (username / password) to combat one of the most common types of breach—compromised credentials. Without the added layer of MFA security, user identification is extremely vulnerable to a cyber-attack because passwords are still very easy to guess, crack or steal.

The primary benefit of MFA is simple and straight-forward: Implementing MFA across an organization’s Internet-facing assets is one of the most effective ways to prevent unauthorized access to your critical online applications and shared documents (e.g. files, folders, videos, audios, etc.). Additionally, the implementation of MFA into standard operating procedures at the end-user level may address compliance requirements with various industry regulations for accessing specific data or connecting from certain locations.

MFA from Qnectus utilizes a second source of validation, like a phone or token, to verify user identity before granting access. Additionally, MFA can provide a highly secure and streamlined login procedure when paired with our Single Sign-On (SSO) capability. The Qnectus MFA solution is simple and quick to implement and, as a cloud-based solution, it integrates easily with your existing technology.

In summary, Qnectus MFA provides a very compelling value proposition

  • Verify authorized user identities in seconds
  • Protect any application on any device
  • Deploy easily and quickly in any environment

Password Management

Over 80% of successful hacking-related data breaches are accomplished with compromised passwords. The primary reasons that people leave themselves vulnerable to unauthorized access to their most sensitive information include the following ill-advised practices:

  • Selection of extremely weak passwords
  • Reuse of passwords across multiple personal and work accounts.
  • Storage of passwords on an unsafe medium (sticky notes, spreadsheet, notebook)

Qnectus offers a leading-edge Password Manager that addresses all of these self-inflicted faults. We provide an encrypted digital vault for each user to store their secure passwords and confidential information. From the digital vault, users can launch websites, edit and share login information and add notes. Other beneficial attributes of our Password Manager solution are as follows:

  • The user needs to remember only one password for the remainder of their life
  • Ability to generate and store extremely strong, unique passwords.
  • Integrates with Multi-Factor Authentication (MFA) for increased security
  • Passwords are accessible from a computer or any mobile device
  • Simplifies user access with Single Sign-On (SSO) integration
  • Complimentary licenses for user’s personal use.

Phishing Awareness & Training

Phishing attacks, designed to gain unauthorized access to your confidential information by tempting you to respond to a seemingly authentic-looking email, remain the most prevailing technique used by cyber threat actors – 6.4 billion scam emails sent daily. Phishing exposes the unfortunate truth that people are the weakest link in your cyber-defense as they are constantly vulnerable to phishing scams that they frequently encounter in their daily routine.

At Qnectus, we not only provide you with a best-of-breed anti-virus solution to detect and help combat phishing threats, we offer a unique state-of-the-art solution to help your employees properly address the phishing attacks that inevitably make it through your malware defenses. Our program provides continuous email security testing and training throughout the year to ensure that the integrity of your key information remains safe from cyber predators. We incorporate multiple on-going customized campaigns that engage your employees with frequent test scenarios utilizing realistic phishing simulation based upon the latest real-world attack methods. And for unfavorable test outcomes, we reach out to the employee with immediate feedback and actionable data as part of our comprehensive training program. We also provide extensive real-time reporting to track the progress of your company, department or individual.

Bottom line, in order to develop a desirable, long-term change in behavior, phishing awareness must be consistently reinforced to ensure that your employees 1) don’t revert to their bad habits after sufficient time has elapsed and 2) gain experience against the latest and most topical intrusion approaches.