CIS Endpoint Security Services (ESS)
CIS Endpoint Security Services (ESS) are available to U.S. State, Local, Tribal, and Territorial (SLTT) government entities, offered in partnership with CrowdStrike. CIS ESS is a solution deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts.
Learn how to get started with CIS Endpoint Security Services (ESS).
Protection and Response at the Endpoint
CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.
CIS Monitoring and Management
Organizations using CIS ESS benefit from a cybersecurity defense partner in our 24x7x365 Security Operations Center (SOC). Our SOC will continuously monitor and manage CIS ESS software, including analyzing malicious activity and escalating actionable threats to the affected SLTT organizations.
Additionally, any organization protected by CIS ESS can request the assistance of our Cyber Incident Response Team (CIRT) when they experience a cyber incident. Our CIRT analysts can reach directly into an affected system and conduct digital forensics remotely, acquiring evidence to uncover what happened and performing analysis to determine the root cause, the scope of the incident, attack methodologies, and more.
Continuous Real-time Vulnerability Monitoring
CIS ESS Spotlight allows for real-time, automated vulnerability identification of all endpoints whether they reside on-premise, off-premise, or in the cloud. Spotlight serves up vulnerability data in seconds via intuitive, user-friendly dashboards.
Pricing
Please contact us for pricing and more information at [email protected].
Protection and Response at the Endpoint
CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.
CIS Monitoring and Management
Organizations using CIS ESS benefit from a cybersecurity defense partner in our 24x7x365 Security Operations Center (SOC). Our SOC will continuously monitor and manage CIS ESS software, including analyzing malicious activity and escalating actionable threats to the affected SLTT organizations.
Additionally, any organization protected by CIS ESS can request the assistance of our Cyber Incident Response Team (CIRT) when they experience a cyber incident. Our CIRT analysts can reach directly into an affected system and conduct digital forensics remotely, acquiring evidence to uncover what happened and performing analysis to determine the root cause, the scope of the incident, attack methodologies, and more.
Continuous Real-time Vulnerability Monitoring
CIS ESS Spotlight allows for real-time, automated vulnerability identification of all endpoints whether they reside on-premise, off-premise, or in the cloud. Spotlight serves up vulnerability data in seconds via intuitive, user-friendly dashboards.
Pricing
Please contact us for pricing and more information at [email protected].
