Features & Quick Stats
Key Features
- Managed Services
- Security Event & Information Management (SEIM)
- Backup
- Cyber Policy Documentation
- Break/Fix
- Vulnerability Scanning
Core Business
Supporting the Insurance Industry with best practices and standards
How Secure Managed Services and Support Helps Independent Agents & Brokers
We keep them running and protected from the bad guys, and help them grow.
Integrations
Our team works with them all
Partnerships
We work with vendors and carriers across the country, many refer their clients to us for support. Including the big management systems providers.
Certifications & Awards
Product FAQs
Cybersecurity & IT/MSP
Provide reports on training activity?
Yes
Offer flexible range of support contracts/plans?
Yes
How on-site service calls handled for out-of-state-clients?
We will fly to the client as needed, but we can dispatch local peers for support if required.
Share WISP templates?
Yes
Have E&O insurance in place?
Yes
Offer client references?
Yes
Provide regular scans for PII on local devices and report location of files?
Yes
Provide automatic patch management?
Yes
Insurance industry client experience?
Yes
Automatic vulnerability scanning capabilities included?
Yes
Offer questionnaire/other resource to manage third-party service provider risks?
Yes
Align WISP plan to insurance industry compliance drivers?
Yes
Provide disaster recovery plan?
Yes
Provide assessments on ongoing scheduled basis?
Yes
Provide staff security awareness training?
Yes
Provide forensic analysis in event of security breach using certified forensics consultant?
Yes
EDR solution include virtual firewall solution?
Yes
Technology specialty?
Security, nobody does it better. We prevent bad things, and offer a top not help desk for the day to day issues.
Provide regular reporting indicating protections status/identified alerts?
Yes
Require all technicians to have certifications?
Yes
Support local hardware?
Yes
Set up/configure SP/DKIM/DMARC?
Yes
Provide Cybersecurity Risk Assessment?
Yes
Endpoint solution monitored by?
Monitored by Company
Provide tracked phishing email simulations?
Yes
States in which you have clients
All states
Endpoint solution protection real-time?
Yes
Have certifications with Microsoft/Network Management/Cyber Security?
Yes
Types of support offered?
[Set number of hours monthly, annually, etc.]
Offer SLA?
Yes
Provide endpoint protection for distributed workforce?
Yes
Vulnerability scanning for External/Internal Networks?
[External Networks, Internal Networks]
Provide dedicated support person to clients?
Yes
Provide risk assessment for new clients?
Yes
Offer implementation plan of technology requirements based on evaluation?
Yes
Network security attended by a person?
Yes
Geographic range of your insurance clients?
National
Provide immediate response once cyber event reported?
Yes
Number of insurance agency clients?
50
Provide frequent short training videos?
Yes
Cyber Risk Assessment time to take?
Speed is dependent on size and scope of project, could be a week, could be a few weeks.
Training videos monitored?
Yes
EDR solution allow for automatic updates?
Yes
Products used for security awareness training?
Our products are routinely evaluated, so my answer here may be different in 12 months. Currently we use BreachSecureNow
WISP frameworks able to work with?
PCI DSS, HIPPA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27992, ESSENTIAL EIGHT
Offer managed hosted solutions?
Yes
Frequency of backups
Depends on need, can be adjusted, but generally nightly
Provide network security monitoring?
Yes
Provide Written Security Policy for third-party service providers?
Yes
Provide state cyber compliance guidelines/recommendations/solutions where agency operates?
Yes
Provide WISP writing services?
Yes
Experience with recovering client from cyber event?
Yes
Have data center?
Yes
Backups on-site?
Yes
Offer 24x7 monitored support?
Yes
Help customize WISP plan?
Yes
Snapshot backups available?
Yes
Backups off-site cloud-based?
Yes
EDR solution behavior or database based?
Behavior patterns
Email threat filter based on triggers or static message?
[Based on triggers]
Provide penetration testing by certified consultant?
Yes
Vulnerability scan frequently
As often as needed.
Provide backup and restore solution?
Yes
Help desk country of origin?
United States
Support email?
Yes
Assist in resolving any cyber event issues?
Yes
Create/provide incident response plan aligned with breach notification requirements?
Yes
Provide Managed Endpoint Protection compliant with regulatory requirements?
Yes
Links inside email messages scanned before opening?
Yes
Provide email threat filter?
Yes
Provide SOC for 24x7 monitoring?
Yes
Endpoint Detection and Response (EDR) products
We use a managed version of Defender
Provide best practice training for email activities?
Yes
Email backup/archiving solutions?
Yes
Provide Incident Response Plan in line with regulatory requirements?
Yes
Offer e-cycling/other data disposal services for non-public information?
Yes
Offer MFA solutions?
Yes
Cyber Risk Assessment score based on Likelihood and Impact?
Yes
Provide managed email threat filter?
Yes
Detect devices without protection installed?
Yes
Users failing simulations automatically added to re-training?
Yes
Provide vulnerability scanning?
Yes
Remediation validation after penetration test findings addressed?
Yes
Vulnerability scan software
This changes as needs change. We don't sit with just one.
How long have you been classified as an MSP?
Since the term existed, we've been providing managed services since 2000.
Provide email encryption?
Yes
AI-based penetration testing?
Yes
Provide spam filter?
Yes
Security awareness training managed by?
Company
Percent of business managed services?
99%
Training videos include assessments/certifications?
Yes
Company classification
Both Cybersecurity and IT/MSP
Help remediate discovered vulnerabilities?
Yes
Cyber Risk Assessment based on NIST?
Yes