IT Security Risk Assessment
Prevent breaches, with proven digital security
Secure your environment
Cloud Group offers a comprehensive IT Security Risk Assessment to help you identify gaps in your security ecosystem in order to reduce your attack surface area.
Leveraging our powerful tools we can help you reduce the number of attack vectors that could be exploited in order to gain access to your network infrastructure and sensitive data.
Book a DemoJoin our Partner ChannelA Security Risk Assessment is a physical on-site assessment of your business and includes:
- People
- Websites and Social Media
- Networks
- Data
- Theft of Funds
- Internet of Things
Introducing the iShield NG5 for Business
iShield is a smart access Unified Threat Management device located at your premises, allowing you to remotely control your entire network from one centralized location.
Several additional procedures are performed including:
- A live survey of a random sample of employees to assess their cyber risk awareness
- A network probe (iShield) to scan the network and highlight potential problems and or malicious/unknown devices
- A review of the company's information security policy and procedures
- Inspection of the current firewall logs
Protect
your network
Monitor
your staff’s performance
Block
unproductive sites
Report
from anywhere, anytime
Tiered approach for businesses
We have a variety of hardware options available to help you manage your customers networks. Each iteration of the iShield is equipped with the same functionality, the only differentiator being the number of users and the internet speed that each unit will support before network degradation becomes prevalent.
iShield
SMB
- 4 Gigabit Network Interfaces
- Celeron Processor
- 4GB RAM
-
200mbps
Throughput - 200 Users
iShield
SMB Rack
- 6 Gigabit Network Interfaces
- i3 Processor
- 8GB RAM
-
200mbps
Throughput - 200 Users
iShield
Pro
- 6 Gigabit Network Interfaces
- i5 Processor
- 8GB RAM
-
1000mbps
Throughput - 1000 Users
iShield
Business
- 6 Gigabit Network Interfaces
- i7 Processor
- 8GB RAM
-
1000mbps
Throughput - 1000+ Users
iShield Key benefits for businesses
Remote Access
To your office using a custom free DynDNS name no static IP or third parties required.
Network Identities
Create network identities in order to control guest networks.
URL Blocking
Restrict access to websites. Time-based blocking. Pre-made blacklists.
VLANS
Set up Virtual LAN networks from the iShield to simplify network management.
Traffic Shaping​​
Limit speed for unproductive websites and prioritize work sites. Prioritize VoIP calls and improve VoIP stability and quality.
Google Safe Browsing
Protection from zero-day attacks and phishing sites.