Summit Cybersecurity Bundle

We know cybersecurity isn’t the most exciting topic, but in today’s world, it’s more important than ever. With cyber threats like hacking, ransomware, and data breaches on the rise, keeping your network and sensitive information secure is a must. That’s why we’re rolling out a mandatory cybersecurity bundle for all our customers—to provide the best protection against evolving threats.

Why Are We Doing This?
Cyberattacks are getting more advanced, and even small security gaps can lead to major problems. Our cybersecurity bundle is designed to:
Stop threats before they reach you
Detect suspicious activity in real time
Protect your business from downtime, data loss, and financial risk
Ensure you meet security standards and best practices

We know this is a change, but it’s a necessary one. A strong cybersecurity strategy isn’t just about defense—it’s about keeping your business running smoothly and securely. The cost of a cyberattack can be devastating, and we’re committed to helping you avoid that risk.  Your Account Manager will be reaching out to you in the coming months to discuss better protecting your business.

What is included in the Cybersecurity Bundle?

Application Allowlisting

Application Allowlisting denies all applications from running except those that are explicitly allowed. This means untrusted software, including ransomware and other malware, will be denied by default.

Why allowlisting?

Application Allowlisting has long been considered the gold standard in protecting businesses from known and unknown malware – including ransomware. Unlike antivirus, Application Allowlisting puts you in control of what can run on your endpoints and servers. This approach not only stops malicious software, but also stops other unpermitted applications from running. This process minimizes cyber threats and other rogue applications from running in your network.

Testing Environment​

Testing Environment utilizes Virtual Desktop Infrastructure (VDI) to provide administrators with clean, isolated, cloud-based environment to evaluate unknown or untrusted application requests. Without risking potential harm to their environment, administrators can safely execute unknown files and observe their behavior before actioning an approval request.

Why is this important?

When users request new applications, IT administrators need to know what dependencies the application requires and validate the application to ensure it’s not doing anything it shouldn’t be. Testing Environment gives IT administrators visibility of file’s behavior before they decide whether to permit the requested application without putting their organization at risk. It also catalogs all dependencies within the installer, so the IT admin does not need to use Installation or Learning Mode on the user’s computer.

Ringfencing

Ringfencing™ allows you to control what applications can do. For example, while both Microsoft Word and PowerShell may be permitted, Ringfencing™ will prevent Microsoft Word from being able to call PowerShell, thus preventing an attempted exploit of vulnerability such as the Follina vulnerability from being successful.

Why is this important?

Under normal operations, all applications permitted on an endpoint have the same access to other applications, files, the network, and the registry that the operating user has. If compromised, an attacker can use the application to steal or encrypt files, abuse legitimate tools, communicate with malicious IPs, and make changes to the system. Ringfencing™ allows you to create boundaries to permit applications access to only what they need.

Network Control

Network Control is an endpoint and server firewall that enables you to have total control over network traffic, which ultimately helps you to protect your devices. Using built-in policies, you can grant access based on port, source IP address, or even create dynamic ACLs that automatically update when device changes it’s IP address.

Why is this important?

Users are not only working from the office but also remotely, meaning that the network we all utilize has quickly become the internet. This dissolution of the perimeter leaves devices and data vulnerable and exposed to cyber threats. This is why you need controls on network traffic in place to protect your device and, by extension, your data. You can achieve this by implementing Network Control solution.

Elevation Control

Elevation Control enables users to run specific applications as a local administrator, even when they do not have local admin privileges. Elevation Control puts IT administrators in the driver’s seat, enabling them to control what applications can run as a local admin without giving users local admin rights.

Why is this important?

Local administrator credentials are sought- after target for cybercriminals. An attacker who has gained access to an endpoint with local admin rights can impersonate other logged-on users or exploit tools locally, potentially pivoting into the entire network. Elevation Control eliminates these credentials from being hijacked without hampering productivity.

Storage Control

Storage Control provides policy-driven control over storage devices, whether local folder, network share, or external storage. Storage Control allows granular policies to be set, which could be as simple as blocking USB drives or as detailed as blocking access to your backup share, except when accessed by your backup application.

Why is this important?

As high-value target for threat actors, protecting data from unwanted access is important. Storage Control enables the creation of granular policies to permit and deny access to network shares, local folders, and external storage by specific users or applications, as well as to enforce encryption on external storage devices.

Detect EDR

Detect is policy-based Endpoint Detection and Response (EDR) solution. This EDR addition watches for unusual events or Indicators of Compromise (IoCs), sends alerts, and takes automated actions if an anomaly is detected.

Why is this important?

Building upon the Zero Trust deny-first approach, Detect provides additional functionality to combat and mitigate the exploitation of known and unknown vulnerabilities. While Zero Trust effectively reduces the likelihood of successful cyberattack, Detect goes further by notifying and automatically responding to indicators of an attack. If a cybercriminal gains access to a server through remote access software used by a business and attempts to connect to IP addresses associated with Royal ransomware, Detect will alert the admin that the server is trying to communicate with known malicious IPs and will isolate the offending server from the network using IoCs.

Managed Detection and Response (MDR)

Managed Detection and Response (MDR) is an advanced cybersecurity service that combines cutting-edge technology with expert human analysis to detect, investigate, and respond to threats in real time. Unlike traditional security solutions that rely solely on automated alerts, MDR provides 24/7 monitoring, proactive threat hunting, and rapid incident response. Our cybersecurity bundle includes MDR to ensure that potential cyber threats are identified and neutralized before they can cause harm, providing continuous protection for your business.

Why is this important?

Cyber threats are evolving faster than ever, and automated security tools alone are not enough to stop sophisticated attacks. MDR is crucial because it adds an expert-driven approach to cybersecurity, ensuring that threats are detected and contained before they escalate. With cybercriminals using advanced tactics like fileless malware and zero-day exploits, MDR provides the necessary human intelligence and rapid response needed to mitigate risks. By incorporating MDR into your security strategy, you gain real-time threat visibility, reduced dwell time for attackers, and a stronger defense against breaches that could disrupt your business operations.

Antivirus Software

Antivirus software is a critical component of any cybersecurity strategy, designed to detect, prevent, and remove malicious software from your devices. It continuously scans files, applications, and network activity to identify threats such as viruses, ransomware, spyware, and other forms of malware. Our cybersecurity bundle includes Antivirus Software, which provides robust real-time protection, threat intelligence, and automated remediation to help safeguard your systems against evolving cyber threats.

Why is this important?

Cyber threats are constantly evolving, and businesses of all sizes are prime targets for cybercriminals. Without proper protection, a single malware infection can compromise sensitive data, disrupt operations, and lead to costly downtime. Antivirus software serves as a first line of defense, actively monitoring and blocking malicious activity before it can cause harm. When combined with other security measures—such as allowlisting, network control, and endpoint detection and response (EDR)—it strengthens your cybersecurity posture, reducing the risk of breaches and ensuring business continuity.

Configuration Manager

Configuration Manager enables IT professionals to set best practice configuration policies across their environment from a single central console.

Why is this important?

Traditionally, companies require components of group policy from Active Directory to set Windows configurations, requiring users to be on the network or using an Active Directory domain. Today’s business network is not always isolated to a single Active Directory domain, making setting and enforcing configurations difficult. Configuration Manager allows IT
administrators to set standardized Windows configurations, such as automatic lock policies, disabling Universal Plug and Play, disabling autoplay, or blocking SMB v1 from one central location, whether or not the computers re connected to an Active Directory domain.

Answering Your Questions

How is it priced?

Our Cybersecurity Bundle is priced per endpoint, to ensure you are only paying for what you need. 

Traditional antivirus primarily relies on signature-based detection to identify known threats, which means it may not catch new or evolving attacks. Our Cybersecurity Bundle takes a proactive, layered approach with Application Allowlisting, Ringfencing™, EDR, and Network Control to prevent threats before they can execute, making it far more effective against modern cyberattacks.

No, our solution is designed to work in the background with minimal performance impact. Application Allowlisting and Ringfencing™ only allow approved applications to run, reducing unnecessary processes. Additionally, our Testing Environment ensures that new software approvals don’t disrupt daily operations.

When new applications or updates are required, they can be evaluated in the Testing Environment before being approved for use. This ensures that only verified and safe software is allowed while minimizing security risks.

By enforcing strict controls on application execution, network access, and data storage, our bundle minimizes the risk of intentional or accidental insider threats. Employees cannot install unauthorized applications, move sensitive data to external storage, or escalate privileges without IT approval.

If a device exhibits signs of compromise, Detect EDR will flag the suspicious activity, isolate the affected endpoint from the network, and alert administrators. This prevents malware from spreading and allows IT to investigate the issue without risking further damage.

We offer dedicated support to assist with setup, policy configuration, troubleshooting, and ongoing maintenance. Our cybersecurity experts are available to ensure smooth implementation and help resolve any issues.