CIS Endpoint Security Services (ESS)

CIS Endpoint Security Services (ESS) are available to U.S. State, Local, Tribal, and Territorial (SLTT) government entities, offered in partnership with CrowdStrike. CIS ESS is a solution deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts.

Learn how to get started with CIS Endpoint Security Services (ESS).

GET STARTED

 

Protection and Response at the Endpoint

CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.

CIS Monitoring and Management

Organizations using CIS ESS benefit from a cybersecurity defense partner in our 24x7x365 Security Operations Center (SOC). Our SOC will continuously monitor and manage CIS ESS software, including analyzing malicious activity and escalating actionable threats to the affected SLTT organizations.

 

How-CIS-ESS-Works

 

Additionally, any organization protected by CIS ESS can request the assistance of our Cyber Incident Response Team (CIRT) when they experience a cyber incident. Our CIRT analysts can reach directly into an affected system and conduct digital forensics remotely, acquiring evidence to uncover what happened and performing analysis to determine the root cause, the scope of the incident, attack methodologies, and more.

Continuous Real-time Vulnerability Monitoring

CIS ESS Spotlight allows for real-time, automated vulnerability identification of all endpoints whether they reside on-premise, off-premise, or in the cloud. Spotlight serves up vulnerability data in seconds via intuitive, user-friendly dashboards.

Gain Visibility into Blind Spots on Mobile Devices in Real Time

Leveraging advanced technology, CIS ESS Mobile consistently tracks the security landscape of your mobile devices, identifying and addressing threats as they emerge, providing you with insights as to where your mobile devices may be vulnerable to cyber attack. ESS Mobile not only provides protection, but also offers peace of mind by continuously monitoring your mobile devices in real time, giving you visibility into hidden threats. Mobile protection is available as a stand-alone feature or as an optional add-on.

Pricing

Please contact us for pricing and more information at [email protected].

Overview

 

Protection and Response at the Endpoint

CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.

CIS Monitoring and Management

Organizations using CIS ESS benefit from a cybersecurity defense partner in our 24x7x365 Security Operations Center (SOC). Our SOC will continuously monitor and manage CIS ESS software, including analyzing malicious activity and escalating actionable threats to the affected SLTT organizations.

 

How-CIS-ESS-Works

 

Additionally, any organization protected by CIS ESS can request the assistance of our Cyber Incident Response Team (CIRT) when they experience a cyber incident. Our CIRT analysts can reach directly into an affected system and conduct digital forensics remotely, acquiring evidence to uncover what happened and performing analysis to determine the root cause, the scope of the incident, attack methodologies, and more.

Continuous Real-time Vulnerability Monitoring

CIS ESS Spotlight allows for real-time, automated vulnerability identification of all endpoints whether they reside on-premise, off-premise, or in the cloud. Spotlight serves up vulnerability data in seconds via intuitive, user-friendly dashboards.

Gain Visibility into Blind Spots on Mobile Devices in Real Time

Leveraging advanced technology, CIS ESS Mobile consistently tracks the security landscape of your mobile devices, identifying and addressing threats as they emerge, providing you with insights as to where your mobile devices may be vulnerable to cyber attack. ESS Mobile not only provides protection, but also offers peace of mind by continuously monitoring your mobile devices in real time, giving you visibility into hidden threats. Mobile protection is available as a stand-alone feature or as an optional add-on.

Pricing

Please contact us for pricing and more information at [email protected].

Features
Chart showing ESS Capabilities 
CIS Services logo

Improve your cybersecurity posture with CIS Endpoint Security Services (ESS).

GET STARTED


Questions about ESS?

View our FAQ