
“There are two types of companies: those that have been attacked, and those that will be”
Robert Mueller, FBI Director
CDS has a suite of tools to stop attackers in their tracks, with our managed cybersecurity detection and response solution backed by a world-class security operations center.
Our services
CDS has a full suite of products available to help mitigate, detect and recover from a cyber threat
Security Operations Center
It all starts with the multi-tenant cloud architecture fueled with integrated threat intelligence, a built-in app store with purpose-built threat detection apps enabling us to deliver 24/365 threat monitoring and providing visibility across (3) attack pillars: Endpoint\Network\Cloud
Email Security
Graphus protects against all types of social engineering attacks (aka business Email Compromise). Cyber Scams | Spear Phishing | Phishing | Malware (Ransomware is one type of malware) | Malicious UR URL
Email Security Training
The Phish ID platform delivers simulated phishing attacks and security awareness training campaigns designed to educate employees, making them the best defense against cybercrime.
Email Security
It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference.
60 mins | $250
Password Manager (Secure Identity & Access Management)
Keeps track of all your passwords
Encrypts your passwords so you are protected
Reduces your risk and Protects
Single Sign-on
Multifactor Authentication
RocketCyber (24/7 Live Managed Detection and Response Asset Visibility)
In order to best protect an organization’s infrastructure, the organization must first know what is connected to it. With the growth in smartphones, IP-enabled devices, and the Internet-of-Things (IoT), organizations need to know what devices are connected to their infrastructure, where they are located, and what they are doing in real-time.
Privileged Account Activity: Leveraging privileged credentials to operate a modern IT network is the norm for most companies, and unfortunately, hackers know this and use it to their advantage. In almost every breach over the past 10 years, privileged credential theft and the ensuing lateral movement are present; it only takes the theft of one highly privileged account to bring a company to its knees. While this might sound ominous, that’s precisely what lateral movement attacks are counting on.
Open Ports to the Internet: A port is basically a way to help systems identify, establish and transmit data from one side to the other. Attackers will scan for open ports (think knocking on doors) using open-source intelligence tools. Closing unneeded ports then reviewing and hardening those needed is a great head start on reducing the attack surface area.
Software Visibility: There is a multitude of services and applications that communicate with a single device. SNAP-Defense showcases how different scripting languages communicate to the endpoint and what information they might reveal (i.e., vulnerabilities like clear text passwords in PowerShell scripts).General User Behavior: Normal user behavior, particularly privileged behavior blends into the background noise of a typical network. Attackers rely on this “noise” to carry out their actions without raising the alarm. Deploying SNAP-Defense brings that behavior into the foreground to be reviewed continuously.
Graphus24/7 Office365/Google Apps (Email Security Monitoring and Policy Enforcement - Security Monitor Accounts)
Accounts Created/Deleted
Altered Administrator Roles
Too Many Login Attempts
Sign-in from Unauthorized Country
Email Impersonation
SharePoint or OneDrive Files Shared Publicly
SharePoint Site Deletion
Accounts Generating Spam
Security Policy Enforcement
Ensure Audit/Mailbox Logs Always On
MFA Authentication for Administrators
No Scripting (PowerShell) Privileges for Non-administrators
Block Dangerous Email Attachments
Block Mail Forwarding Rules
Block Third Party Applications
Limit External Information Leakage
Block Top Spamming Countries
Spanning
Backup for Microsoft 365 supplies organizations with reliable backup and recovery for their Microsoft 365 from Exchange Online, SharePoint Online, OneDrive and Microsoft Teams. Unlimited storage space and an unrestricted retention policy guarantee that your valuable Microsoft 365 data will remain completely backed up and recoverable at all times.
*Advanced Cloud Recovery (Disaster Server Recovery (Per Server Up to 500GB)
Secure off-site recovery infrastructure
Failover to the cloud recovery site
Disaster recovery orchestration
Failback to primary site or to a new location
Instant recovery of machines in a local, virtualized infrastructure
Recovery to dissimilar hardware, including bare-metal, physical, virtual, or cloud environments
Non-disruptive failover testing in the cloud
Protection of data on 20+ platforms, including virtual, physical, and cloud-based servers
Full image and file-level backups
Proactive AI-based anti-ransomware protection for Windows machines
Automated testing of all key disaster recovery scenarios
Verify the integrity of your disaster recovery plans by executing runbooks in test mode via the web console and isolating testing from the production network
A seamless extension of local networks to the cloud recovery site
Dissimilar hardware recovery with Universal Restore
Restore Windows and Linux systems to the same, similar, or dissimilar hardware during a failback procedure, including bare-metal, physical, virtual, or cloud
Local failover with Instant Restore*Requires CTI Cloud Backup Subscription
*Requires CTI Cloud Backup Subscription
“I underestimated how hard it would be adjusting to working from home, but with Dr. Schell’s help, I was able to regain focus.”
— OLIVIA R., CLOVE CLIENT