Cyber Security: Services Overview

Upstart Cyber was founded to make cyber security accessible to businesses of all sizes. The “packages” we’ve outlined here are guidelines we’ve developed over many years. Naturally, we’ll tailor your business’ package to match the scale and complexity of your IT infrastructure. It’s worth noting that we’re able to provide our SMB customers with many of the top-tier cyber security products used by large corporations and government agencies, as we have far exceeded the license minimums necessary to deploy those tools. It’s also worth noting that we do not mark up products. Ever. We’re a service provider. Finally, we realize there may be acronyms and technical language on this page you might not be familiar with, we welcome the opportunity to answer any questions you might have.

Security Starter

The very basics of security include tracking allowed hardware and software, documenting third-party service providers who access systems, access management including user, password and privileges, multi-factor authentication, security awareness training and logging and monitoring of these elements.

Tools: MFA, SIEM, Security Awareness Training, VA

Inventory

• Hardware asset creation and maintenance
• Software asset creation and maintenance
• Service providers

Access management

• User account management
       Add
       Remove
       Password management

• Privilege levels
       Access granting process creation and oversight

• MFA

Security awareness training

• Short, email-based training
• Automated and responsive phishing testing

Logging and monitoring

• Basic access logs
• Basic hardware
•  Basic software

Talking points

• Inventory
• Account management
• MFA
• Awareness training
• Basic logging

An add on to Security Starter, this package includes everything in in the “Starter” package with the addition of centralized identity access management, inventory of systems affecting authentication, email security, and enhanced enterprise logging and monitoring across all platforms and system types.

Upstart Data Center

Required packages: Security Starter

Tools: Email security

Access management – Move into basic, change price

• Centralized account management
• Centralized authentication
• Service account management

Inventory

• Authentication and authorization systems

Logging and monitoring

• Centralized, intelligent correlation
• Time synchronization across sources
• Critical assets
• DNS
• URL
• 365-day minimum retention
• Weekly log review

Email security

• DMARC
• Unnecessary file type blocking
• Anti-malware protections

 

This is the base endpoint package
Required packages: Security Starter
Tools: Software/patch manager

Software

• Authorized software enforcement
• Operating system session enforcement
• Automated patch management

Network

• Secure, remote endpoint management
• Host-based firewall setup and management

Access management

• Local account management

Threat detection

• Vulnerability management process
• Basic anti-virus

Operations

• User support
        Workstations
        Printers
        Voice
        Mobile
        Cameras
• Workstations
        Setup
        Configuration optimization
• Servers
        Setup
        Architecture optimization
        Configuration optimization
• Services
        Cloud
        Hosted
• Ongoing Improvements
        EOL replacement recommendation
        Capacity upgrades
• Uptime
        Service level guarantee

The ultimate in endpoint protection, adds on to what Endpoint Security offers.
Required packages: Security Starter, Endpoint Security
Tools: EDR/XDR, SSE (SWG, CASB)

Fiber network

Software

• Automated discovery and real-time software enforcement
• Services management
• Secure communication configuration management

Data protection

• Stored, sensitive data encryption

Mobile

• Mobile device security

Threat detection

• Automated vulnerability detection
• Ongoing, automated vulnerability remediation
• Centrally managed anti-virus and anti-exploitation
• Host-based intrusion detection

Network

• SWG

Logging

• Server command-line

This is a package focused on ensuring business operations remain intact.
Required packages: Security Starter
Tools: Data Backup

Upstart Cyber was founded to make cyber security accessible to businesses of all sizes. The “packages” we’ve outlined here are guidelines we’ve developed over many years. Naturally, we’ll tailor your business’ package to match the scale and complexity of your IT infrastructure. It’s worth noting that we’re able to provide our SMB customers with many of the top-tier cyber security products used by large corporations and government agencies, as we have far exceeded the license minimums necessary to deploy those tools. It’s also worth noting that we do not mark up products. Ever. We’re a service provider. Finally, we realize there may be acronyms and technical language on this page you might not be familiar with, we welcome the opportunity to answer any questions you might have.

Data protection

• Data management process creation and management
• Data remediation process creation and execution
• Secure data disposal
• Automated server data backups and retention – volume threshold

Inventory

• Data sensitivity and location

Access management

• Role-based user data access

Adding on to what Biz Continuity offers, this package gives us advanced data handling and processing, as well as third-party provider security management.

Upstart Cyber was founded to make cyber security accessible to businesses of all sizes. The “packages” we’ve outlined here are guidelines we’ve developed over many years. Naturally, we’ll tailor your business’ package to match the scale and complexity of your IT infrastructure. It’s worth noting that we’re able to provide our SMB customers with many of the top-tier cyber security products used by large corporations and government agencies, as we have far exceeded the license minimums necessary to deploy those tools. It’s also worth noting that we do not mark up products. Ever. We’re a service provider. Finally, we realize there may be acronyms and technical language on this page you might not be familiar with, we welcome the opportunity to answer any questions you might have.

Required packages: Security Starter, Biz Continuity

Data

• Advanced data classification
• Data storage by class
• Data flow documentation by class

Data Protection

• Automated workstation critical data backups and retention – volume threshold

Third-party providers

• Service provider policy creation and management
• Service provider classification
• Service provider security validation

Operations:

• Hot and cold server instances with live recovery

Network Security

The basic network package focusing on security network design and configuration.
Required packages: Security Starter
Tools: N/A

Network

• Unauthorized asset handling
• Secure network device configuration
• Network device software updates

Operations

• Architecture optimization
• Network configuration management
• Ongoing improvements
        EOL replacement recommendations
        Capacity upgrades
• Uptime
        Service level guarantee

Talking points

• Manage network devices
        Uptime
        Security config
        Updates

The basic network package focusing on security network design and configuration.

Required packages: Security Starter

Tools: N/A

Network

• Unauthorized asset handling
• Secure network device configuration
• Network device software updates

Operations

• Architecture optimization
• Network configuration management
• Ongoing improvements
        EOL replacement recommendations
        Capacity upgrades

Uptime

• Service level guarantee

This package builds on the Network package, providing real-time and automated security controls.

Required packages: Security Starter, Network Security

Tools: NAC, SSE (ZTNA)

Upstart Cyber was founded to make cyber security accessible to businesses of all sizes. The “packages” we’ve outlined here are guidelines we’ve developed over many years. Naturally, we’ll tailor your business’ package to match the scale and complexity of your IT infrastructure. It’s worth noting that we’re able to provide our SMB customers with many of the top-tier cyber security products used by large corporations and government agencies, as we have far exceeded the license minimums necessary to deploy those tools. It’s also worth noting that we do not mark up products. Ever. We’re a service provider. Finally, we realize there may be acronyms and technical language on this page you might not be familiar with, we welcome the opportunity to answer any questions you might have.

Network

• Secure, remote network device management
• Secure network protocol validation and use
• Secure network architecture
• Up-to-date architecture documentation
• Network segmentation and filtering
• Network transit encryption
• Secure remote access (work from home)
• Real-time connected device inventory
• Real-time detection of unauthorized assets
• Real-time, individualized network access assignment

Access management

• Secure account access to network devices
• Secure, remote user access (work from home)

Threat detection

• Real-time network intrusion alerts

Logging

• DHCP
• Network device command-line
• Network traffic flows

The ultimate package built for organizations with the strictest security requirements, or customers who are highly security focused, it includes everything in all other packages and some specific, additional functions.

Required packages: N/A

Tools: All

Fiber network

Additional functions of Zero Trust

• Secure script execution
• DLP
• Logging of sensitive data creation and deletion
• Remote-wipe capability on mobile devices
• Separate workspaces on mobile devices
• Role-based access controls
• Service provider logging
• Separate compute environments for critical functions
• Security event log correlation and real-time alerting
• Detailed service provider security assessment
• Service provider monitoring
• Secure service provider decommissioning