Security Packages

Itek Systems Management has been working as a managed service provider for over 17 years, during this time we have built a reputation within the industry as a result of our quality services.

From

£4.00

Per endpoint per month
Itek Systems Management
Security Professional

Suitable for companies that have minor compliance needs and require a standard level of security.

Includes Itek Essentials plus:

From

£9.00

Per endpoint per month
Itek Systems Management
Security Advanced

Suitable for companies with compliance needs requiring high levels of security with low-risk tolerances.

Includes Itek Professional plus:

From

£22.00

Per endpoint per month

Popular Addons

MDR
MDR SIEM /Log Collection/Retention
MDR (Managed Detection and Response) services use SIEM (Security Information and Event Management) tools to detect, investigate, and respond to security threats in real-time while ensuring that logs are stored for forensic and compliance purposes.
Policy Management
Policy Management
Policy management involves the development, implementation, and enforcement of security policies and procedures within an organisation. Includes Cyber Essentials certification.
Mobile Device Management
MDM
MDM (Mobile Device Management) is a solution that enables organisations to manage, monitor, and secure mobile devices such as smartphones and tablets to ensure that they are only being used for purposes approved by the company.

Glossary Terms

Essentials

Antivirus/Antimalware software

Detects, removes, and prevents malicious programs like viruses and spyware from infecting your computer. It scans files and activities to protect your system from potential threats and security breaches.

Patch Management

Involves regularly updating software and systems with patches or fixes to address security vulnerabilities, improve functionality, and ensure smooth operation. It helps protect against threats and bugs by keeping software current.

Firewall Management

Involves configuring and monitoring firewall settings to control incoming and outgoing network traffic. This process helps protect a network from unauthorised access, threats, and cyberattacks by enforcing security rules and policies.

Spam Filtering

Uses algorithms to identify and block unwanted or malicious emails before they reach your inbox. It sorts emails based on patterns and characteristics, reducing clutter and protecting against phishing and other email-based threats.

Web Content Filtering

Restricts access to specific websites or online content based on predefined criteria. It helps protect users from inappropriate material, malware, and security threats by blocking or allowing web content according to set policies.

Security Awareness Training

Educates employees about identifying and avoiding cyber threats like phishing and scams. It helps improve their ability to protect sensitive information and reduce the risk of security breaches in the organisation.

Disk Encryption/Protection

Secures data on your hard drive by converting it into a coded format. Only authorised users with the correct decryption key can access the information, protecting it from unauthorised access or theft.

Domain Spoof Prevention

Uses techniques like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) to verify email sender authenticity, preventing attackers from forging or spoofing domain names. This protects against phishing and ensures emails are genuinely from the claimed source.

Professional

EDR (Endpoint Detection and Response)

Continuously monitors endpoints to detect and respond to cyber threats, protecting devices like computers and servers. MDR (Managed Detection and Response) enhances this by providing expert-managed services, offering 24/7 monitoring, threat detection, and response, ensuring comprehensive and proactive cybersecurity protection.

Quarterly IT Risk Assessment

Reviews your organisation's technology and processes every three months to identify and address potential security threats and vulnerabilities, ensuring ongoing protection against risks.

Vulnerability Scanning

Automatically checks your systems for weaknesses that could be exploited by hackers. It helps identify and address security gaps to protect your network and data from potential threats.

Dark Web Monitoring

A service that alerts you if your personal information, like passwords or credit card numbers, appears on the dark web, helping protect you from identity theft and fraud.

Managed SOC

A (Security Operations Centre) is a team of experts that monitor and protect your organisation's network 24/7, detecting and responding to cyber threats so you don't have to handle it alone.

Phishing Simulation

Tests how well people can spot fake phishing emails by mimicking real attacks. It helps train users to recognise and avoid scams, improving overall security awareness.

Advanced

Email Encryption

Is a security measure that scrambles the content of an email, making it unreadable to anyone except the intended recipient, ensuring privacy and protection from unauthorised access.

Intrusion Detection (IDS)

Monitors your network for suspicious activities and potential threats. It alerts you if it detects any signs of unauthorised access or attacks, helping to prevent security breaches.

Application Control

Manages and restricts which software can run on your systems. It ensures that only authorised applications are used, reducing the risk of malware and improving overall security.

Data Leak Prevention (DLP)

Tools protect sensitive information by monitoring and controlling its movement. They prevent unauthorised access, sharing, or leakage of data, ensuring that confidential information remains secure and compliant with regulations.