“There are two types of companies: those that have been attacked, and those that will be”

Robert Mueller, FBI Director

CDS has a suite of tools to stop attackers in their tracks, with our managed cybersecurity detection and response solution backed by a world-class security operations center.

Our services

CDS has a full suite of products available to help mitigate, detect and recover from a cyber threat

 
 
 

Security Operations Center

It all starts with the multi-tenant cloud architecture fueled with integrated threat intelligence, a built-in app store with purpose-built threat detection apps enabling us to deliver 24/365 threat monitoring and providing visibility across (3) attack pillars: Endpoint\Network\Cloud

 
 

Email Security

Graphus protects against all types of social engineering attacks (aka business Email Compromise). Cyber Scams | Spear Phishing | Phishing | Malware (Ransomware is one type of malware) | Malicious UR URL

 
 

Email Security Training

The Phish ID platform delivers simulated phishing attacks and security awareness training campaigns designed to educate employees, making them the best defense against cybercrime.

 

Email Security

It all begins with an idea. Maybe you want to launch a business. Maybe you want to turn a hobby into something more. Or maybe you have a creative project to share with the world. Whatever it is, the way you tell your story online can make all the difference. 

60 mins |  $250  

 

Password Manager (Secure Identity & Access Management)

Keeps track of all your passwords

Encrypts your passwords so you are protected

Reduces your risk and Protects

Single Sign-on

Multifactor Authentication

RocketCyber (24/7 Live Managed Detection and Response Asset Visibility)

In order to best protect an organization’s infrastructure, the organization must first know what is connected to it. With the growth in smartphones, IP-enabled devices, and the Internet-of-Things (IoT), organizations need to know what devices are connected to their infrastructure, where they are located, and what they are doing in real-time.

Privileged Account Activity: Leveraging privileged credentials to operate a modern IT network is the norm for most companies, and unfortunately, hackers know this and use it to their advantage. In almost every breach over the past 10 years, privileged credential theft and the ensuing lateral movement are present; it only takes the theft of one highly privileged account to bring a company to its knees. While this might sound ominous, that’s precisely what lateral movement attacks are counting on.

Open Ports to the Internet: A port is basically a way to help systems identify, establish and transmit data from one side to the other. Attackers will scan for open ports (think knocking on doors) using open-source intelligence tools. Closing unneeded ports then reviewing and hardening those needed is a great head start on reducing the attack surface area.

Software Visibility: There is a multitude of services and applications that communicate with a single device. SNAP-Defense showcases how different scripting languages communicate to the endpoint and what information they might reveal (i.e., vulnerabilities like clear text passwords in PowerShell scripts).General User Behavior: Normal user behavior, particularly privileged behavior blends into the background noise of a typical network. Attackers rely on this “noise” to carry out their actions without raising the alarm. Deploying SNAP-Defense brings that behavior into the foreground to be reviewed continuously.

Graphus24/7 Office365/Google Apps (Email Security Monitoring and Policy Enforcement - Security Monitor Accounts)

Accounts Created/Deleted

Altered Administrator Roles

Too Many Login Attempts

Sign-in from Unauthorized Country

Email Impersonation

SharePoint or OneDrive Files Shared Publicly

SharePoint Site Deletion

Accounts Generating Spam

Security Policy Enforcement

Ensure Audit/Mailbox Logs Always On

MFA Authentication for Administrators

No Scripting (PowerShell) Privileges for Non-administrators

Block Dangerous Email Attachments

Block Mail Forwarding Rules

Block Third Party Applications

Limit External Information Leakage

Block Top Spamming Countries

Spanning

Backup for Microsoft 365 supplies organizations with reliable backup and recovery for their Microsoft 365 from Exchange Online, SharePoint Online, OneDrive and Microsoft Teams. Unlimited storage space and an unrestricted retention policy guarantee that your valuable Microsoft 365 data will remain completely backed up and recoverable at all times.

*Advanced Cloud Recovery (Disaster Server Recovery (Per Server Up to 500GB)

Secure off-site recovery infrastructure

Failover to the cloud recovery site

Disaster recovery orchestration

Failback to primary site or to a new location

Instant recovery of machines in a local, virtualized infrastructure

Recovery to dissimilar hardware, including bare-metal, physical, virtual, or cloud environments

Non-disruptive failover testing in the cloud

Protection of data on 20+ platforms, including virtual, physical, and cloud-based servers

Full image and file-level backups

Proactive AI-based anti-ransomware protection for Windows machines

Automated testing of all key disaster recovery scenarios

Verify the integrity of your disaster recovery plans by executing runbooks in test mode via the web console and isolating testing from the production network

A seamless extension of local networks to the cloud recovery site

Dissimilar hardware recovery with Universal Restore

Restore Windows and Linux systems to the same, similar, or dissimilar hardware during a failback procedure, including bare-metal, physical, virtual, or cloud

Local failover with Instant Restore*Requires CTI Cloud Backup Subscription

   *Requires CTI Cloud Backup Subscription

“I underestimated how hard it would be adjusting to working from home, but with Dr. Schell’s help, I was able to regain focus.”

— OLIVIA R., CLOVE CLIENT

Questions before getting started? Get in touch.