21
1 © 2020 Ultima Business Solutions Security guidebook keeping your business secure, made simple

keeping your business secure, made simple

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: keeping your business secure, made simple

1© 2020 Ultima Business Solutions

Security guidebook keeping your business secure, made simple

Page 2: keeping your business secure, made simple

2© 2020 Ultima Business Solutions

Contents

Hello,

We know your business depends on Ultima’s ability to provide reliable, uninterrupted service, so in light of the recent developments around Coronavirus disease (COVID-19), we would like to share with you the measures we are taking to ensure service continuity.

02 CEO Foreword From Scott Dodds

03 WhyIsRemoteSecurityDifferentToOfficeBased?

04 Protecting Your Users: Overview

06 Protecting Your Users: Options

07 Protect Your Devices: Overview

08 Protect Your Devices: Remote Device Management

09 Protect Your Devices: Options

10 Protect Your Data: Overview

11 Protect Your Data: Options

12 ProtectYourData:B2BSharing

13 ProtectYourData:BestPractises

14 Secure Remote Working: Checklist

15 Ultima’s Managed Security Solutions

16 Advisory Services: Cyber Security Assessment

18 Managed Services

19 Ultima: About Us

20 Ultima: Our Security Vendors

21 Our Partnerships

We have made investments in our technology infrastructure and business continuity planning to ensure we can operate all our systems and processes remotely with no interruptiontonormalservicelevels.Thismeanswe’reabletoprovideyouwithaseamlessservice despite the switch to remote working due to self-isolation and social distancing.

Our business continuity plan also covers our logistics facility and our logistics partners to ensure the protection of our workforce and continuity of inbound and outbound deliveries. We are in close communications with our vendor partners regarding stock, supply chain and deliveries, and are working proactively with them on lead times, so we can keep you updated of any changes.

As always, we remain committed to supporting your business with an unparalleled level of service and will continue to monitor the situation, providing you with updates appropriately and promptly.

If you have any questions, please let me know or contact your Account team.

Kind regards

CEO Foreword

Scott Dodds, CEO

Page 3: keeping your business secure, made simple

3© 2020 Ultima Business Solutions

why is remote security different to office based?

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Protect Your UsersMultifactor authentication to secure user access

Secure internet browsing

Any device posture driven VPN

Recenteventsmeanthatcompanieshavehadto, inmanycases, ‘fast-track’amovetoremoteworking.Thiswaseasierforsomebusinessesthanothers,howeverforalmosteverycompany,thisisnotsomethingthathadneededtobeconsideredatthisscaleandfortheentirecompany.Thekeypriorityherewasfunctionality-makingsureuserscanstillcarryouttheir work no matter their location. However once this is accomplished, it is also critical to ensure security of your business and systems.

Themajorityoforganisationswillhavehadagoodlevelofsecurityprotectingoffice-basedemployees,howeversuchsolutionsoftendon’tlendthemselveswellwhenoutsidetheoffice.We’ve collated this guide to help you address these challenges and ensure that your users, devices and data are fully secured despite your workforce being geographically dispersed.

Protect Your Devices Protect Your DataRemote device management

Internet browsing through Citrix

Encrypt your devices

Secureyourfiles

Protect against data loss

EnableB2Bsecuredatasharing

Page 4: keeping your business secure, made simple

4© 2020 Ultima Business Solutions

Protecting your users: overview

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Users are crucial to maintaining the security of a company’s environment, however they are often the target of malicious hackers who might try to impersonate legitimate emails to access usercredentials.Theserisksincreasewithremoteworking,aspoliciesandlogsarespreadacrossmanylocations.Therefore,adaptingyoursecurityprocedurestoensureyourusersareprotected no matter where they are working from is critical.

Therearethreekeyareastofocusontohelpyouachievethis:

Multi Factor Authentication – Securing access to data centre, cloud and SaaS infrastructure securely

Secured Internet Browsing–Ensuringthatauser’sremoteinternetaccesshasthesamesecurityfeaturesasitdoesinanoffice Any Device VPN–VPNaccessisstillrequiredformanycompaniesin2020andbeyond,inordertoaccesscruciallegacyapps

Thesecanbeachievedthroughanumberofroutes,includingwithnativeMicrosoftsolutionsthatmanycompanieswillhaveexistinglicensesfor,andcomplimentedwithleadingsecurityvendors where needed.

Page 5: keeping your business secure, made simple

5© 2020 Ultima Business Solutions

Microsoft Authenticator

Protecting your users: Options

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Withemployeesnotbeingwithinthesecuredperimeterofyourcorporateoffice,youneedtoensurethesecurityofyourusersandtheaccesstheyhavetocorporatedataandapplications.ThelatestgenerationofMultiFactorAuthentication(MFA)nowoffersintuitiveinteractionwithusersbymeansofmultipleoptionsforauthentication:

Textmessage

Voice call

Pushnotificationwithacknowledgement

Passwordless authentication

Our preferred solution is from Microsoft, integrating fully with the Microsoft cloud platforms natively as well as legacy systems via Radius and numerous other platforms via API or other integration mechanisms.

Multi Factor Authentication

Whenemployeesareintheoffice,theymightbesubjecttoalocalsite-basedproxyoranextgenerationfirewallprovidingfiltering,dynamicaccesscontrolandlogging/reportingforuserinternetactivity.Whathappenstothiswhentheyareworkingfromhome?Traditionallythesolutionwassimple-VPNusersbackuptoadatacentre,andthenroutethroughacorporateproxy.Theconceptofroutingalltrafficbacktoanon-premisedatacentrecancreateanegativeuserexperience.Byutilisingacloud-basedsecuritysolution,users’internetaccesscanbesecuredwithyourpolicywithoutusersexperiencinganylossordifferenceinservice.Modernsolutionscandelivervaryingaccessandsecurityasrequiredincluding:

URLfilteringforaccess/restrictionstowebsitesbasedoncategories

Cloud based VPN solution to deliver access back to a corporate data centre

Geo-Located POPs meaning the same solution can work globally, delivering the same policy but end users route to their local location ensuring consistent performance

Centralised policy management, logging and reporting

Blockingaccesstomaliciouscontent,includingzero-dayprotectionsandfileanalysisformaliciousactivity

Our solutions can work across Windows, Mac and mobile devices, ensuring a consistent approach no matter what device your employees use.

Secure Internet Browsing

Page 6: keeping your business secure, made simple

6© 2020 Ultima Business Solutions

Protecting your users: Options

If you would like to learn more about our Autonomous Business Continuity solutions, click here

DespitethedriveandpushtowardsCloudBasedservicessuchasOffice365andotherSaaSplatforms,manyorganisationsstillretainanumberoflegacyapplications,hostedinanoffice-based or hosted data centre. When many employees need to work remotely, there are two main options available to address this need:

VPNVDI/Citrixbasedsolution

Bothhavetheirpros/cons;someapplicationsmayworkbetterinavirtualdesktopenvironmentthanothers,orusersmightbeusedtoopeninganapplicationontheirlocalhostandit working without issues. Some investigations and decisions on the best approach will be required. In this guide, we are primarily focusing on VPN technology- there are a number of solutions that will deliver this functionality:

1–UtilisingaNextGeneration/Perimeterfirewall(thismayalreadybeinplace,butcapacitywouldneedtobevalidated)2–ImplementinganewdedicatedVPNsolution(manyliketoseparatethefunctions,andthissolvespotentialcapacityburdenonaperimeterfirewall)3–MicrosoftAlways-OnVPN(MicrosoftfocusedsolutionusingembeddedclientandPKIforauthentication)

Authentication&user/deviceidentificationwillbekeytosecuringtheVPNaswellasmonitoringthetrafficandusagepatternsonceauserisconnected.WehavealreadycoveredMultiFactorAuthenticationsuchasAzureMFA,andPKIBasedcertificatesolutionscanalsodeliversecureauthentication.Thesametechnologycanoftenbeusedtoenablealaptop,desktoporsmartphone/tabletdevicetoo.Wecanworkwithyoutoidentifyandrecommendthemostappropriatesolutionforyourenvironment.

Any Device VPN

Page 7: keeping your business secure, made simple

7© 2020 Ultima Business Solutions

Protect Your devices: overview

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Previously,enduserdevicesmayhavebeenbasedpurelyintheofficefortraditionaldesktopusers,oryoumighthavehadamixofonandoffthenetworkforlaptopusers.Now,devicesneed to be able to be managed and secured no matter where their physical location.

Abreachcancausereputationaldamage,lossofearningsandevenpermanentclosure.Toavoidthis,youneedtobeabletoadaptyourtechnologytocopewiththesenewchallenges.Here,wewillfocuson3keyareas:

Remote device management

Secured Internet Services

Encrypt your devices (and data)

Thesecanbeachievedthroughanumberofroutes,includingwithnativeMicrosoftsolutionsthatmanycompanieswillhaveexistinglicensesfor,andcomplimentedwithleadingsecurityvendors where needed.

Page 8: keeping your business secure, made simple

8© 2020 Ultima Business Solutions

Protect your DEVICES: Remote device management

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Thewayemployeesareworkingischangingandtheconceptof“Officebased”islikelytochangeconsiderablyinthefuture.ThisbringstheITteamawholenewsetofchallengesina‘corporate’ITconfigurationapproach.Whatkindofcomponentsneedtobemanagedonanend-userdevice?

Anti-Malware Solution – Updates and centralised monitoring and reporting are critical

Patching – the Operating System and numerous applications will always need to be kept up-to-date

Applications – Either deployment of updates, new versions or new solutions

Policy–Fromcorporatebrandingtosecuritysettings,policymayneedtobedefinedorupdatedatanytime

Logging & Monitoring – Ability to gain insight and logs in the event of a forensic analysis as well as security baseline standards and adherence to company security controls

Thereareanumberoftechnologiesandstrategiesthatcanaddressalloftheserequirements.Thekeyistosupportacloud-based/internetfacingsuiteorproductthatcandeliverthisnomatterwheretheuserislocated,bothinorouttheofficewithnodifferentiation.Remember-thisdoesn’tjustapplytoacorporatelaptop-ifyouhaveaBYODpolicyoryoursystemspermituserstoaccesscontent/data on a personal device, they need to be considered too.

Page 9: keeping your business secure, made simple

9© 2020 Ultima Business Solutions

Protect your Devices: options

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Protect Your Devices: Secured PerimeterWe’vealreadydiscussedensuringthatyourusers’internetbrowsingissecured,butwhataboutifyouareusingaVDIorCitrixbasedsolutionandusersarethereforeinyour‘clouddatacentre’?

Weoftenseecompaniesnotfeeltheneedtosecuretheircloudenvironments-commentssuchas“thevendortakescareofthat”arecommon,butunfortunatelytheplatformproviderisonlyresponsibleforasmallaspectofsecurity.Cloud-basedNextGenerationFirewalltechnology,oracloud-basedwebfilteringsolutionwillensurethatyourusersarestillsecuredwhenusingCitrixorVDIbasedtechnologieshostedinapubliccloudsuchasMicrosoftAzure.ModernsolutionscanperformanumberoflayersofsecuritysuchasURLFiltering,ApplicationManagement,Botprotection,Zero-DayMalware and more. Full logging and reporting will give you the ability to ensure your users are both protected and productive at all times.

Protect Your Data: Encrypt Your DevicesWithemployeesworkingremotelyanddatanolongerintheconfinesofanoffice,it’simportanttokeepthatdatasecuredintheeventofadevicebeinglostorstolen.ThemainplatformsforuserstoworkonareMicrosoftorAppleled(fromalaptopperspective),bothofwhichofferenterprisegradeencryptionsolutionsfordataatrest.MicrosoftBitlockercanbemanagedinanumberofways,includingCloudManaged.ThisensuresthattheITteamcanoffercentralisedrecovery,loggingandenforcementofdeviceswhentheyareinorouttheoffice.PortabledevicessuchasaUSBstickcanbemanagedinthesamewaywithtechnologysuchasBitlockerToGo.

Windows Bitlocker

Page 10: keeping your business secure, made simple

10© 2020 Ultima Business Solutions

Protect your data: overview

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Data has historically sat within secured data centres, accessed through corporate networks using corporate devices. However, that has now changed, with data moving to the cloud and SaaS services and usersworkingfromhomeoffices,andsometimesusingtheirownequipment.Thedatamustbesecured,butatthesametimeshouldbeaccessiblethroughfrictionlesssecurity.Weneedtoensurethatdata is only accessed by the right people using appropriate devices and that data does not leak accidently or maliciously and fall into the hands of the wrong people. We need to ensure three things:

Wecansecurealloftheusers’filesandbeabletorecoverfromloss

Protectthefilessoiftheyendupinthewronglocation,theycannotbeaccessed

ProvidesecureB2Bdatasharingforwhenyouneedtoprovidedatatoyourcustomers/suppliers

ThiscanbeachievedusinganumberoftoolsbothinherentwithinOffice365andtheEMSsuite,butalsousingotherproductsandservicesthatUltimacanlicense,deploy,configureandmaintainforyou.

Page 11: keeping your business secure, made simple

11© 2020 Ultima Business Solutions

Protect your data: options

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Adataleakisacompany’sbiggestworry,butimplementingandconfiguringdatalosspreventiontolookforsensitiveinformationcouldrelievethisworry.DataLossPreventionwillsearchdocuments,emailsandMicrosoftTeamschatmessagesforhealthcare,passportandcreditcardnumbersandblockthosefrombeingsenttointendedrecipients.Mimecastcouldalsobeusedtopreventdataleaksby searching emails for key words and blocking accordingly.

Backup and Recovery

Ifdatalossdoesoccur,anditresultsindatabeingunavailableduetoacryptovirusorjustaccidentaldeletion,youneedtobeabletorecoverthosefilesthatareinlocationsoutsideofyourcorporatenetwork.ToolssuchasAvepointprovidethisbackupandrestorefunctionalityforOffice365,includingTeams,Exchange,SharePoint,OneDrive,ProjectOnlineandmore,allfromacloudbasedSaaSplatform.

Email Resilience

ToolssuchasMimecastcanalsoofferprotectiondeliveredfromaunifiedplatformandadministrationconsole,includingintegratedarchivingandrecoverymeansforreducedriskandstrongerresiliency.MimecastSyncandRecoverprovides simplifiedadministrationand streamlined recovery so thatorganisations canmanagecompliancearchivinganddata resiliency froma singleAdministrationConsole,withouttheneedfordedicatedbackupandrecoverysolutions.Additionally,ITadminscaneasilysearchtorecoverindividualitems,entiremailboxes,orfolders.

Data Protection And Classification

Youneedtoprotectfiles,sothatiftheyendupinthewronglocation,theycannotbeaccessed.AzureInformationProtection(AIP)couldhelpprotectthesedocumentsfromotherdepartmentsorindividualsaccessingdocumentsmarkedasclassified.AIPwillprotectthedocumentfromendtoend,soifadocumentwhichismarkedas‘internaluseonly’getssharedexternally,theendrecipientwouldnotbeabletoaccessthisdocument.ByaddingonAzureRightsManagement(RMS),wecangofurtherwithencryption,trackingandotherfeatures.WithRMS,youcanprotectafileandtheprotectionstayswiththefile.ThisprotectionremainsevenifitissavedorcopiedtostoragethatisnotunderthecontrolofIT,suchasahomePC.Furthermore,youcanthenauditandmonitorusageoftheseprotectedfiles,evenafterthisdataleavesyourcompanyboundaries.

Page 12: keeping your business secure, made simple

12© 2020 Ultima Business Solutions

Protect your data: b2b sharing

If you would like to learn more about our Autonomous Business Continuity solutions, click here

ProvidesecureB2Bdatasharingforwhenyouneedtoprovidedatatoyourcustomers/suppliers.AzureActivedirectoryB2Ballowscollaborationbetweentwoorganisationswhilstworkingsafelyandsecurely.AADB2Ballowsexternalpartners,whomaynothaveAzureADinplace,touseyourorganisation’sapplicationsandaccessdatawhilstkeepingcompliantwithyourcompany’spolicies.ThiswillallowexternalpartiestoaccessMicrosoftTeams,OneDriveandSharePointwiththerelevantpermission.

UsingacombinationofRMSandAzureADandduetothenatureofAzureRightsManagementbeingacloudservice,there’snoneedtoexplicitlyconfiguretrustswithotherorganisationsbeforeyoucanshareprotectedcontentwiththem.IftheyalreadyhaveOffice365oranAzureADdirectory,collaborationacrossorganisationsisautomaticallysupported.Iftheydonot,userscansignupforthefreeRMSforindividualsubscriptions,oruseaMicrosoftaccountforapplicationsthatsupportthisauthenticationforAzureInformationProtection.

ForCitrixcustomers,similarfeaturescanbeenabledwithCitrixShareFile.Thisenablesyoutoshareallrequiredfilesanddocumentsinafewsimpleclicks.ShareFilefeatureslimitlessstorage,aconvenientemailpluginandtheabilitytosendlargefileswithoutcloggingemail,thushelpingtoaccelerateproductivity.Thisalsoincludes,bank-levelencryptioncapabilitiestoprotectemailsintransitandatrest.

Page 13: keeping your business secure, made simple

13© 2020 Ultima Business Solutions

secure remote working: Best Practices

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Remoteworkingmaybesomethingyouhaveembracedforyears,oritmaybeanewconceptthathasbeenimplementedquicklytoensureyourstaffcanremainsafeathome.Wehaveincludedthreebest practices to follow and consider:

Cybercriminalsareunfortunatelyjumpingonusersduringsuch periods of uncertainty. This means that many,especially those in healthcare or working with healthcare users, are being targeted via phishing or malicious emails. Users should exhibit extra caution in reviewing such emails and think before clicking on a link or before providing any information. User education is key in this, and can be complimented with technology to help prevent such

messages.

Be Wary About Suspect Emails

TheUKGovernmentCyberSecuritydivisionhaveupdatedtheir recommendations for remote working. Click below to

read their advice:

Thiscoversanumberofbestpracticesandtipsforsecuring

your workers whilst they are remote.

Read the NCSC Guidance

Outsidetheoffice,datamaynotbesubjecttothenormalbackupregimethattakesplacewhenintheoffice.Ensurethat data can still be managed and backed up when outside

theoffice.

TechnologysuchasOneDrive,SharePointandcomponentsofOffice365willgivea fullycloud-basedsecuresolutionfor data storage, keeping you backed up and secure with

industry leading protection.

Don’t Forget To Backup

Click Here

Page 14: keeping your business secure, made simple

14© 2020 Ultima Business Solutions

Secure remote working: checklist

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Deploy and enforce Multi Factor Authentication for gaining access to corporate resources

Ensureyoucanidentifyyouremployeeswhentheyaren’tface-to-faceorcallingfromamobilephone/personalnumber(egpasswordresets)

Enableyoursystemstobesecurelymanagedviatheinternet.Thisincludesupdates,patches,logsandreportingdata

Update DLP policies – consider restricting access to sensitive data remotely

Createapolicyforunmanagedvsmanageddevices(ifyouadoptaBYOD/personaluseapproach)

Ensureyourinternetconnectionandperimetersecuritysolutioncancopewithanincreaseinbandwidthandaccessviayourfirewalls

Dependingonyourindustry,bepreparedandeducateyourusersforanincreaseinmalicious/phishingemails,evenifyourcompanyisn’tacommontarget,theymayuseyouforyourcustomers/suppliers.Useandconfigureyourtechnologytohelpstopthis

Review monitoring and log policies

Have your remote working solution independently tested and reviewed for any security weakness

Keeptrainingyouremployees–differentworkingenvironmentscanmeandifferentrisks.Educatethemandgetthemtonotbeafraidtosayifsomethingdoesn’tseemright

Leverage your existing investment – many organisations have licenses for suites such as Microsoft EMS but haven’t actively deployed or used them

ConsiderinvestinginanSOC/MDRsolution,thiscanproactivelymanageandmonitoryourinfrastructureforanomalies

We’vecomeupwithaquickandsimplechecklisttocoverthehighlevelareasthatyouneedtoconsiderwhenpermittingemployeestoworksecurelyoutsidetheoffice:

Page 15: keeping your business secure, made simple

15© 2020 Ultima Business Solutions

Ultima’s managed security solutions

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Significantlyreduceinformationsecurityriskandenhanceboardroomandinvestorconfidence Thwartthelatestsophisticatedthreatsthatoutdateddetectionsystemsandpreventativetechnologysuchasfirewallscanmiss Rapidly respond to genuine incidents and gain a clear understanding of the risks posed Improveefficiencybyenablingin-houseteamstofocusonfixingrather than discovering threats Avoid up-front investment in expensive, complex and resource-intensive technology Remove the need to recruit and train in-house security professionals Receive end-to-end help and support detecting and mitigating complex security vulnerabilities Obtain enterprise-level protection at a price that can cost less thanhiringjustonesecurityengineer

Business Benefits

Key Components of our Cost-Effective MDR

Managed Threat Detection and Response from Ultima provides the around-the-clock support needed to mitigate the risks posedbythelatestsophisticatedthreatactors.Thiscost-effectiveservicemonitorsnetworkinfrastructuretohuntforthreatsandprovidestheearlynotificationandremediationadvicenecessarytorespondswiftlyandeffectively.

Qualified ExpertsA team of dedicated security analysts, engineers and researchers trained to the highest standards

Integrated IntelligenceThreatresearchfromleadingprovidersandlatest intelligence from leading exchanges such as CiSP

Detailed ReportingRegular customer reports containing thorough security insights and analysis

Cyber Incident ResponseExperienced incident responders on hand to help investigate and remediate breaches

Tried And Tested ProcessesCompliancewithISO9001,ISO27001&PCIDSS for adherence with best security practices

Advanced analyticsCustom-developed behavioural analytics, proprietary algorithms to detect attacks

“MDR is a cost-effective service that gives us peace of mind that we are doing all we can to protect our clients, our business, our staff, our counterparties and other partners”

An Ultima MDR Customer

Page 16: keeping your business secure, made simple

16© 2020 Ultima Business Solutions

advisory services: cyber security assessment

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Securityofdigitaltechnologyandonlineservicesisfastmovingandconstantlyevolving.Thetraditionalsecurityperimeterisdisappearing,beingreplacedbyborderlessworkplaceswheredataroamsfreelyamongthecloud,networkandendpoints.Thecyber-attackthreatisevolvingandbecomingtechnicallymorecomplexwithawideningoftheattacksurfacestoo.

40% of Organisationswere impacted by crypto-miners 92% of Attacksleverage vulnerabilitiesregistered for morethan a year

$640K Collected by RYUKransomware as well as causing mass disruption

77% of Businesses do not recognisesupply chain risksbeyondthefirsttier

78% of Companiesconsider cyber a high or very high risk

1,946,181,599 Recordscontaining personal or sensitive data werecompromised last year

OurCyberSecurityAssessmentoffersamodularriskbasedandindependentsecurityreview,helpingtoidentifygapsand provide recommendations around areas in which your organisation may be vulnerable to cyber threats. Delivered by our security specialists, the engagement looks at a wide range of attack vectors, providing proactive advice, backed by industry best practice and established accreditations.

All our assessment reports contain a scored risk rating and comparison against industry averages. Regular assessments are advised to maintain alignment with best practice and track changes in your scored risk rating.

“The UK has one of the world’s leading digital economies, designed to exploit the benefits of the internet, but this also makes it vulnerable to attack from hostile countries, criminal gangs and individuals.” House of Commons 99th Report - Cyber Security in the UK

Threat AnalysisVisibility of live threatswithin your currentinternetwork service

VulnerabilityScan of publicfacing services forexploitable assets

Secure CloudAnalysis of serviceconfigurationagainstrecommendations

Best PracticeReview of securitypolicies, operationsand management

Risk RatingReport of risks and comparison againstindustry average

Your Example Risk Report

Modular Assessment Options

Page 17: keeping your business secure, made simple

17© 2020 Ultima Business Solutions

advisory services: cyber security assessment

If you would like to learn more about our Autonomous Business Continuity solutions, click here

ThepackagedCyberSecurityAssessmentsalignedtotheNCSCbestpracticesandCyberEssentialsschemes,provideoptionsfromalighttouchquestionbasedassessmenttodetailedons-ite consultation. All packages use a risk scoring method to deliver improved visibility of your cyber security risk in a graphical, clear and concise format and help answer the key questions such as what should we be doing to manage the current cyber security practice.

Assessment Package Options

Our remotely delivered question based assessment provides a review of your current cyber security practice and its alignment with the Cyber Essentials programme. Following completion you will receive a summary of your security posture and risk score from Ultima’s security specialists.

An on-site assessment with Ultima’s security consultants focused on how the design of your net-work topology, installed infrastructure services and operational policies align to a positive cyber securitypractice.Followingcompletionyouwillreceiveafullanalysisandfindingsreport.

Express Assessment Package

Advanced Assessment Package

Anon-siteworkshopwithoursecurityconsultantsincludinganalysisofnetworktraffic,detailedassessmentofyourtechnicalandnon-technicalsecurityconfigurationsacrosson-premise,cloudandmobileservices.Yourscoredcyberriskreportwillbepresentedwithdiscussionofkeyfindingsand regular risk update sessions reporting in a clear and actionable trend chart.

Ultimate Assessment Package

Our Package Features

Express Advanced Ultimate

NCSC aligned assessment multi-part questionnaire Onsite Consultation Onsite Workshop

Scored Risk Rating Cyber Risk rating

Modular scored analysis report Presented management summary with Modular scored report

Cloud Assessment Best Practice Configuration Analysis Cloud Platform design and configuration review

External Vulnerability Assessment

Scan of 5 public IP addresses and highlight results

Scan of Public IP addresses and detailed findings

Rating Trending Charts Regular risk update assessment

Cyber Essentials Plus Certification

Guidance and Certification Assessment

Remote consultation

Page 18: keeping your business secure, made simple

18© 2020 Ultima Business Solutions

Our Managed Services

Havingdeliveredservicedeskssince1998,weknowhowtodeliverarobust,predictableandhighlyperformantoperation.PoweredbyServiceNowandBluePrism,weprovideaccesstobothSharedandDedicatedoptions,backedbyamodern,intuitiveinterface.Staffedbycertifiedtechnicalspecialists,ourCortexsolutionprovidesaconsistent,highqualityservicedeskexperience,actingasanextensionofyourITteam.

A Single Unified ITIL PlatformIntegrated into ServiceNow, we embracethestandardsofITILbestpractice within all of our Service Management practices.

Optimised IntelligenceAccelerating value through a combination of process automation, orchestration, self service and machine learning, all built-in.

TUPE ExperienceExperiencedintheTransferofUndertakings, (Protection of Employment) agreements, with transparent, concise and fair agreements.

If you would like to learn more about our Autonomous Business Continuity solutions, click here

For organisations looking to continue supporting their own environment, but who wish to call upon a third-line escalation service in the event of a P1 emergency or when an issue arises whichliesoutsideoftheircomfortzone,Ultimaofferaflexibletoken-basedreactivesupportservice.Designedtoprovideremotetechnicalinvestigation,guidanceandadvisoryservices,IRISprovidesyouwiththeconfidencetotakeaction.

Token Based Support

One Number, Simplified AccessReceive direct access to our ServiceNow portal to view live updates on your open incidents & track them.

Flexible ContractsThreelevelsofsupport,inpacksof5,10,20&50units.Themoreyoupurchase,the cheaper the per-token price.

Predictable Service CostsOne token relates to three hours of support. Simply select the type of support you need.

Intelligent Service Desk

Asorganisationsevolveandbecomemorecomplex,sodoesthetechnologythatsupportsthem.ByselectinganIntelligent Remote Infrastructure Support (IRIS) service from Ultima, you can keep pace with change, safe in the knowledge that your mission critical infrastructure, services, applications and workloads - whether they reside on-premise or in the cloud - are fully supported.

Your Service, Your Way Essentials, Advanced & Ultimate, pro-viding you with greater choice over what you want Ultima to manage.

Remote Monitoring & ManagementComplete peace of mind for your critical services and infrastructure, delivered from our 24x7x365 ISO 27001 certified TSC.

Deep Analytics Gives us insights into your IT infrastructure & workloads, allowing us to stay one step ahead of problems that could affect your estate.

Mission Critical Support

CPU27

Page 19: keeping your business secure, made simple

19© 2020 Ultima Business Solutions

ultima: About Us

UltimaBusinessSolutionshasdevelopedintoaleadingintelligentinfrastructureand automation services company, focused on the provision of tailored solutions and services, including the design, deployment and support of complex ITsolutions, based on industry leading technologies.

These are delivered by Ultima's extensive team of highly skilled technical personnel that include solutions architects, consultants, engineers, projectmanagers and serviceoperationsstaff.

As a partner for over 25 years with 12accumulated Gold competencies, we know Microsoft solutions inside out. We are also 1 of only4FastTrackLSPsforModernWorkplace.

As a Premier Partner, Ultima design, implement and support virtual network and security, cloud and DaaS, NSX, virtualisation, and business continuity solutions.

Ultima holds Check Point’s highest partner accreditation and is one of only two 5*Partners in the UK. We are a specialist partner for Cloud Guard and Sandblast Suites.

We are a HPE Gold partner for server and storage and we have been recognised as the Top Value Partner 2019 as well asIntelligentEdgePartneroftheYearfor2018.

PlatinumSolutionsAdvisor&2019WorldwidePartner of the Year for EMEA, offeringmobility, BYOD, virtualisation, app delivery,security, work shifting, cloud and networking.

Being a Platinum partner means that youcan rely on Ultima for everything from storage, servers, converged infrastructure, networking, data protection and security.

Cisco Premier Certified Partner managingsolutions for networking, data management, remote access, unified communications,perimeter and endpoint security.

Ultima hold Gold Partner status with HP Inc, allowing you to benefit from high-quality planning, deployment, maintenance and support, backed by HP's products.

Strength through strategic partnerships

If you would like to learn more about our Autonomous Business Continuity solutions, click here

Page 20: keeping your business secure, made simple

20© 2020 Ultima Business Solutions

ultima: Our Security vendors

If you would like to learn more about our Security Proposition, click here

Public and Private Cloud Perimeter Authentication

Device Governance

Data

Internet Access

SIEMApplicationEmail

Advisory Services

MDRManaged Detection & Response

Protection and secure configuration ofyour cloud infrastructure.

Protection and management of endpoint devices inside and outside of your

organisation.

Protection from malicious and unsolicited email, applied before it

enters your environment.

Secure presentation of applications to internal and external clients, removing

the surface area of your perimeter.

Identify and secure the data when stored and accessed from inside and outside of

your organisation.

Identify and stop abnormal activity and threats across the client, server and

network infrastructure.

Monitoring and assessment of the design and usage of your organisations

infrastructure.

Secure access to the internet and cloud services when inside or outside of your

managed perimeter.

Next generation, multi vector protection preventing threats passing across the

boundaries of your infrastructure.

Secureidentificationandconditionalvalidation of access to your applications

and infrastructure.

MDRManaged Detection & Response

Page 21: keeping your business secure, made simple

21© 2020 Ultima Business Solutions

03330158000 [email protected]

Head OfficeGainsborough House

ManorPark,BasingstokeRoadReading,Berkshire,RG20NA

© 2020 Ultima Business Solutions. Allrightsreserved.Thisdocumentmaynotbereprinted,reproduced,copiedorusedinwholeorinpartbyanymeanswithoutthepriorwrittenconsentofUltimaBusinessSolutions.Allproductnames,logos,andbrandsarepropertyoftheir

respectiveowners.Allcompany,productandservicenamesusedinthisdocumentareforidentificationpurposesonly.

Tier One Partnerships

Ultimaoperateinthespacebetweenvendorsandourcustomers.Thisallowsustoprovideimpartialadvice,deliverturn-keyandbespokesolutions,aswellasofferarangeofmanagedservices.Below,youwillfindalistofourTier1vendors.

AsidefromourStrategicandTier1partnerships,wecanalsosourcesolutionsfromover200technologyvendorsandareabletotransact1,000sofproducts,sowhateveryourrequirements include, ask us for a quote!

Wider Technology Partnerships