Security management doesn’t have to be a nightmare. At Computer Solution, our technology services make IT simple, and it all starts with our flagship security stack, Sentry Business Solutions.
In the first part, we flesh out the obvious point: why your employees should not be responsible for overseeing essential security processes.
Points to cover:
- The relationship between threat exposure and user error.
- Why a backup and recovery solution is the only true protection against employee data loss and corruption.
- The benefits of malware management.
- Browser-based data breaches and how to protect against them.
- How to maximize workplace productivity and efficiency.
In the second part, we discuss the benefits of Sentry’s layered security design and how Sentry Risk Intelligence allows us to help you assess, manage and eliminate risk.
And finally, part three outlines the benefits of a proactive security management solution, as opposed to a reactive one.
We hope this series will tempt you enough to take Sentry for a no-risk test drive, but whether you are currently in the market for an IT provider or not, there is more than enough information here to make your next board or business meeting pretty interesting…
And it all starts with arguably your number one asset– your employees.
The Problem: User Error
Sentry’s layered security stack is designed from the ground up to minimize threat exposure and maximize threat detection. Threat minimization is a common security pillar we will refer to time and time again.
Let’s face it– security isn’t the first thing on the minds of most employees. Relying on them to carry out the daily, mundane security tasks your network depends on is bound to create lapses from time to time. These security gaps place your computers, and the precious data they hold, unnecessarily at risk.
Another issue with user error deals with user accounts.
Limiting user account control is one of the easiest steps businesses can take to minimize threat exposure. However, administrative privileges are required to execute most security commands, which we’ve already shown you is a major no-no. Administrative control should only be given to those who absolutely need it.
Understanding risk is essential to creating a low-risk environment. Giving employees unrestricted access to do as they please with business workstations and servers is never the right choice.
So what’s the solution to the problem of employee error?
The Solution: Security Management
Sentry tackles the problem of user error by removing your employees from the equation and putting our staff in their place.
Sounds expensive, but our proactive, data-driven model is so powerful a team of a few can manage the needs of many. This gives Sentry the power to provide best-in-class value, which we look at closely in Part III.
Our prices start at less than $1/day per workstation, and we offer a cross-platform solution for Windows servers and workstations, OS X workstations and Linux servers.
Eliminating employee error is a huge benefit of a managed security solution. Let’s examine five specific ways Sentry makes it happen.
Your Employees. Your Data. Our Responsibility.
Data loss can be a business owner’s worst nightmare. Implementing an appropriate backup and recovery solution is the safest step a business can take to protect itself over the long run.
Does your business have a data backup and recovery plan? Does it make sense to leave any of that responsibility up to an employee?
With the cost of backup lower than it has ever been, it is amazing to see how many businesses either still don’t do it or continue to rely upon a manual solution.
A manual solution places responsibility of running a backup on the end-user. This creates a major security issue because backups usually need to be run at least once a day. Over time, employees are bound to periodically forget or otherwise fail to carry out the task.
Sentry Backup delivers a completely automated backup and recovery solution with built-in integrity monitoring. Designed around a hybrid cloud model that utilizes 7 worldwide data centers, Sentry features block-level data deduplication, a smarter technology that allows us to do more with less space.
And that’s how we can sell our storage starting at just $1/GB per month.
Next Gen Malware Management for an Online World
The most common issues with end-user error and antivirus software are simple ones, such as making sure licenses stay current and that scans and updates are running correctly.
Sentry AntiVirus removes malware management from your employees and places it on us. Most importantly, when a threat is detected, you don’t have to wait for anyone to figure it out; we already know.
Once we remove the threat we assess whether it makes sense to take further mitigation, such as blocking access to a malicious website. In such cases, we always consult with the business before a decision is made.
Total malware management is a key benefit of a managed security solution. Sentry Agent is in charge of malware integrity, delivering a complete set of daily and hourly checks to ensure all malware processes are running as they should be.
If a process fails, Agent’s reporting feature proactively alerts a technician via our dashboard so action can be taken. We will discuss this and other benefits of a proactive security model in Part III.
Next Gen Browser Protection for an Online World
The trending increase in browser-based data breaches is alarming.
Antivirus solutions can’t protect against browser-based attacks such as emails containing malicious links or drive-by downloads. These two threats alone comprise 54% of data breaches, and are a huge risk to employee internet access.
Sentry’s layered security model deploys multi-dimensional, dedicated security services designed to detect and deter specific types of threats. The purpose of Sentry Web Protection is to prevent browser-based attacks by blocking malicious sites before they load.
Comprehensive Threat Minimization
Keeping all your systems up-to-date with the latest security patches is an essential element of security management. Patching software vulnerabilities is key to minimizing threat exposure and creating a safer network environment.
Most patch solutions cover only Windows and Microsoft updates. Sentry provides a comprehensive patch solution for operating systems as well as over 40 Microsoft and 80 third-party application families.
This ability to keep patches up-to-date across the devices on your network is a huge advantage of a comprehensive security platform. After all, do you really think your employees are doing it?
Sentry Update is driven by a powerful patch engine that automates a majority of the patch installations. Our staff is alerted of any failed or otherwise uninstalled updates and can manually install them from our dashboard, either one at a time, or across all devices on your network.
And, as we will see in the final section, ease-of-implementation and deployment efficiency are central to providing best-in-class value to the Sentry platform.
Part I: Conclusion
As we’ve shown you, user error creates a major security issue by placing the responsibility of critical security processes on their employees. On the other hand, a comprehensive security management solution places the safekeeping of your network, and ultimately your data, in the hands of those who are trained to do it.
Next up, we will look at the benefits of Sentry’s layered security model and the role of risk assessment in creating a cyber security plan. And it all starts with Sentry Risk Intelligence…