Cybersecurity is a threat to every business, no matter the size. As one of the area’s leading Security Services Provider (MSSP), Pylon brings highly customized, cost-effective IT security solutions to protect your organization. Our personalized approach ensures that you receive the best security expertise, catering to the specific needs of your company.
Our range of Managed Security Products and Services can help you negotiate the risks of operating a business in a world dominated by the Internet. As we increasingly rely on smooth and safe online interaction, Pylon stands at the absolute forefront of internet security.
With our broad spectrum of Managed Security Services, we’re well-positioned to help you with the specific security requirements of your business. Our solutions can be provided as either fully managed solutions, customer-owned solutions, or a combination of the two. Our Security Operations Center monitors and manages the Security Solutions we provide 24 x 7, for your peace of mind.
How can our Managed Security Services help you stay secure?
Who’s watching your network?
Pylon performs 24×7 Managed Detection and Response (MDR) specifically for organizations that don’t have the internal expertise and/or bandwidth to keep a vigilant watch over the security of their IT environment. We employ the right people and the right processes to efficiently supplement your organization’s security threat management efforts. Our team identifies intrusions as they are happening, so you can extract them from your environment before any damage is done.
As information technology continues to advance, so does the malware designed to compromise it. In fact, the technology behind today’s security threats has quickly eclipsed the standard antivirus protection most commonly used. The Pylon Advanced Endpoint Security Service protects your endpoints against advanced threats by leveraging a combination of technologies and services for multi-faceted activity analysis and tracking, behavioral blocking, and deep process inspection. The service includes traditional (signature-based) and next-generation (analytics-based) malware protection, with frequent updates and real-time lookup. It also helps satisfy the relevant PCI and HIPAA compliance requirements.
A network firewall continues to be as important as a locked front door at each of the locations where you’ve installed network infrastructure. You can’t rest easy once it’s installed, though. The increasing sophistication of attackers and their tools means that firewalls have to be continuously monitored and managed. Our Pylon Unified Threat Management (UTM) Firewall Service delivers the latest in firewall technology, supported by a team of experts that keeps it current to your business operations and the threats that endanger it—all while maintaining compliance with industry standards like PCI DSS.
The Pylon File Integrity Monitoring (FIM) Service notifies you when files are created or key files are viewed, deleted or modified, and when group ownership of files is changed. The service provides granular controls and filters that can pinpoint specific files and either perform scans at desired intervals or operate in real-time mode for continuous protection. File-level behavior can then be correlated to additional security and audit activities to determine potentially harmful network activity.
How do you efficiently check your business network for any of the thousands of different security risks that can offer hackers an open door? Our Vulnerability Management Service provides automated scanning of all your network assets, taking both the external perspective of an outside attacker as well as an internal, “inside the network” approach. Vulnerabilities are prioritized and reported, and a team of security experts stands ready with guidance on how to approach their remediation. As a PCI-qualified Approved Scanning Vendor, Pylon also delivers the ASV scan you need to prove your compliance.
The easiest way for an attacker to gain access to your business network is through the weakest link—your employees. Social engineering exploits mistakes, missteps, and the general lack of awareness of your organization when it comes to protecting critical assets like customer data. The Pylon Security Awareness Training (SAT) service provides an ongoing program of web-based instruction across the topics that are relevant to your operations. In addition, you’ll have the visibility and control you need to ensure that the program is being followed by all your employees on an ongoing basis.
PCI DSS Specifically, two sections of PCI address the need for file integrity monitoring software: 10.5.5: Use file integrity monitoring or change-detection software to ensure