Endpoint Security

Convergent Information Solutions sells and supports a complete suite of products and services that serve to secure your vulnerable endpoints and servers, whether they are located on premise, or in the hands of remote or mobile workers.  Our Endpoint Security products, in addition to “classic” Antivirus capabilities, also include features such as:

  • Anti-Ransomware technology: Our Anti-Ransomware technology automatically detects, via behavioral analysis, attempts by various processes to encrypt data both locally and over the network.  Automated recovery of encrypted file data that occurs while the behavioral analysis is running is also included.
  • AI / Deep Learning technology:  Our Endpoint Security products include an advanced Artificial Intelligence detection engine, on the Endpoint, that can detect malware for which no previous Antivirus signatures exist, thwarting 0-day malware infection attempts that “classic” Antivirus cannot detect.
  • Exploit Prevention:  Our Endpoint Security products also detect exploit techniques that attackers use, leveraging legitimate services and processes to distribute malware, or otherwise compromise systems.
  • Cloud Management:  Our Endpoint Security products are all cloud-managed, giving visibility and control no matter the location of the endpoint, whether it be on-premise or remotely located.  For environments (higher security) where Endpoints are not authorized to directly contact internet-based resources (such as the cloud management system) an update cache and secure relay can be configured in such an environment to meet these requirements.
  • Windows and Mac environments are supported.
  • EDR Capabilities are also available depending on feature set purchased, as well as Managed Threat Response services.

Contact Us for more information regarding our Endpoint Security Products!

Server Security

Convergent Information Solutions sells and supports a complete suite of products and service that serve to secure your vulnerable endpoints and servers, whether they are located on premise, or in the hands of remote or mobile workers.  Our Server Security products, in addition to “classic” Antivirus capabilities, also include features such as:

  • Anti-Ransomware technology: Our Anti-Ransomware technology automatically detects, via behavioral analysis, attempts by various processes to encrypt data both on the server and over the network.  Automated recovery of encrypted file data that occurs while the behavioral analysis is running is also included.
  • AI / Deep Learning technology:  Our Server Security products include an advanced Artificial Intelligence detection engine, on the Endpoint, that can detect malware for which no previous Antivirus signatures exist, thwarting 0-day malware infection attempts that “classic” Antivirus cannot detect.
  • Exploit Prevention:  Our Server Security products also detect exploit techniques that attackers use, leveraging legitimate services and processes to distribute malware, or otherwise compromise systems.

 

  • Cloud Management:  Our Server Security products are all cloud-managed, giving visibility and control no matter the location of the endpoint, whether it be on-premise or remotely located.  For environments (higher security) where Servers are not authorized to directly contact internet-based resources (such as the cloud management system) an update cache and secure relay can be configured in such an environment to meet these requirements.
  • Server Lockdown (Windows Only) can be configured to prevent ANY unauthorized change to the server operating system while in operation.
  • Virtual Environments are supported.
  • Windows Server and most common Linux Server platforms are supported.
  • EDR Capabilities are also available depending on feature set purchased, as well as Managed Threat Response services.

Contact Us for more information regarding our Server Security Products!

Network Security

Convergent Information Solutions sells and supports a complete suite of products and services that serve to secure your network infrastructure.  Our Network Security products are:

Secure Firewall:

Our firewall products can be configured to provide maximum protection (and network activity visibility) via several key features:

  • Deep Packet Inspection:  Our firewall products provide ASIC-accelerated deep packet inspection, which enables our firewalls to utilize IPS and other engines when inspecting TLS-encrypted traffic; as more and more internet traffic shifts to full TLS encryption, this feature is key to ensuring your network access is as secure as possible
  • Zero-Day Machine Learning:  Our firewalls include technology that allows them to detect new threats (those for which “classic” Antivirus does not have current detection patterns for) using AI and dynamic file analysis, as they occur, and prevent the payloads from reaching your endpoints and servers.
  • Advanced Web Filtering:  Advanced Web Filtering not only prevents users from accessing undesirable sites (controlled by a comprehensive user, group, or network host-based policy engine), but can also detect the latest threats as well, stopping them before they reach end users.
  • Integration with Endpoint Security products:  Our firewalls can also share information with our Endpoint Security products, allowing a deeper understanding of traffic flows, and better detection of potential threats, throughout your computing infrastructure.
  • Application visibility: With our advanced Layer 7 analytics engine, the firewall can detect, block, and gather statistics on individual application traffic traversing the firewall; for instance this can enable an administrator to block certain types of streaming traffic, while allowing other types needed for business purposes through the firewall, without complicated firewall rules and host lists.
  • Web Application Firewall:  Our firewalls include an advanced Web Application Firewall which can:
    • Detect attacks against web server based applications, even attacks being carried out via a TLS connection.
    • Dual Antivirus scanning of content can also be configured as needed.
    • This feature also includes Load Balancing capabilities, as well as failover configuration.
  • Email Filtering is also offered as an additional add-on if on-premise mail services are in use – features include:
    • Full MTA implementation
    • Live Anti-Spam System
    • Email Encryption
    • DLP Features to prevent unauthorized data egress.
  • Our firewall products are available in appliance and virtualized format.
  • Our firewall products can also be deployed in Azure and AWS to protect your cloud resources as well.

Contact Us  for more information regarding our Firewall Products!

Cloud Security

Convergent Information Solutions sells and supports a complete suite of products and services that serve to secure your cloud resources.  Our Cloud Security Solutions include these products:

Cloud Email Filtering:

Whether your email is hosted On-Premise, or in the Cloud, our Cloud Email Filtering solution can protect your users from malicious activity via their email inbox:

    • Prevent Imposters from attacking your high-profile targets, and block other attacks with machine learning analysis of inbound email content.
    • Multi-Layer protection is used to prevent malware from reaching your user’s inbox, including “classic” Antivirus, Machine Learning (AI) and malicious URL analysis engines.
    • We fully integrate with Microsoft 365, allowing direct automatic removal of phishing emails and other malicious emails from user mailboxes as new threats are identified.
    • Data Loss Prevention policies are also available to prevent unauthorized egress of sensitive information, such as financial information, health information, and other PII in emails and attachments.
    • Message and Attachment encryption are supported, included a full web portal for ease of use when communicating with 3rd parties that do not have their own email encryption systems.

Cloud Phishing Protection:

    • Our Phishing Protection product allows an administrator to regularly test and educate their users so that they can avoid being compromised via Phishing attacks.
    • Hundreds of realistic and challenging phishing attacks are available from our library of simulated attacks
    • Training modules are available to be automatically engaged with users that are “caught” during testing, and tracked regarding their response during testing and training.
    • This system can be used with customer email systems that are located on-premise or that are cloud-based.

Cloud Environment Security:

Our Cloud Environment Security Products are designed to simplify securing your IAAS (AWS, Azure, and Google Cloud) environments, as well as Kubernetes, IAC, and Docker environments.

    • Monitor the security posture of all your cloud environments in a single console.
    • See your Asset Inventories, Cloud Spending statistics at a glance.
    • Automate compliance assessments with our audit-ready reporting.
    • Additionally, all of our Server Protection and Network Security products will operate in your cloud environment, providing more telemetry and security, and integrating with our Cloud Environment Security Console.
    • Our Managed Threat Response service also integrates with this solution.
    • Our EDR Solution also integrates with this system, and provides full Cloud Workload security (whether Linux, Windows, or Container-based) across all workloads.

 Contact Us  for more information regarding our Cloud Security Products!

Mobile Device Management

Convergent Information Solutions sells and supports a solution that will assist your IT management staff in securing your mobile devices, whether company-owned or BYOD.  Mobile devices are becoming, more and more, an effective attack target for malicious actors; if your organization has users that access ANY sensitive data via mobile devices (Smart Phones, Tablets, or Laptops/Notebooks), you should seriously consider our solution to assist in keeping track of and securing these devices.

  • Multiple Platforms are supported, with management of Configuration and Policies from a central cloud console:
    • iOS
    • Android
    • Windows 10/11
    • macOS
  • Get detailed reporting, inventory and asset management statistics for managed devices
  • Install, Remove, and View Apps deployed on managed devices
  • Restrict access to prohibited or questionable applications
  • Flexible Deployment:  You can manage either corporate or BYOD devices, securing your business data.
  • With our additional add-on security module, protect your mobile devices:
    • Detect Malware, Ransomware, and Unwanted Applications
    • Prevent Access to unwanted or dangerous websites
    • (Available on some platforms) prevent connection to untrustworthy Wi-Fi networks
  • This solution integrates with our Managed Threat Response Service and EDR Products.

Contact Us  for more information regarding our Mobile Security Products!

Secure Cloud Storage

Convergent Information Solutions sells and supports a Secure Cloud Storage Solution that is ideal for storing your sensitive data offsite:

  • Works with any backup or storage software product that supports AWS S3; our system is fully compatible with the S3 API.
  • While our Secure Cloud Storage is fully compatible with products that use the S3 API, it does so with storage costs that are 80% less than AWS S3!
    • Additionally, there are no data egress fees!
  • When you enable Immutable Storage mode on your storage repository, and use it in conjunction with a comprehensive backup strategy, you can ensure that even if you have a ransomware attack perpetrated against your local or cloud infrastructure, you have a path to recovery that cannot be tampered with by outside actors.
  • Available now!

Contact Us  for more information regarding our Secure Cloud Storage Solution!

Secure Backup

Convergent Information Solutions sells and supports a complete suite of products and services that serve to securely back up your sensitive and valuable data, whether it is located on premise, or in an IAAS or SAAS cloud environment:  

  • Backup Data stored in Microsoft 365 (remember, Microsoft does not maintain historical backups of your data; this is left to the customer)
  • Backup Data stored locally on Windows or Linux Servers:
    • SQL Backup
    • Exchange Backup
    • File Backup
  • Store it all:
    • Locally in an Immutable D2D storage vault:
      • Can also be additional backed up to an optional tape library for storage offsite or true “air-gap” compliance
    • In the cloud in our Immutable-Storage-Capable Secure Cloud Storage Solution
    • Or both!
  • Automated backup testing is also supported, as well as data deduplication to reduce storage costs.

Contact Us  for more information regarding our Secure Backup Solutions!

Skip to content