User and Infrastructure Security

Significant part of the success of an organization is managing their employees and their inner infrastructure, from spreading awareness to managing the incoming and outgoing messages between your organization to other organizations. Watad can help you achieve that by offering these premium solutions:

EPP & EDR Security awareness Mail Security

EPP (Endpoint Protection) & EDR (Endpoint Detection and Response)

Trend Micro Apex One

Trend Micro Apex One uses a blend of advanced threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment.
This blend of protection is delivered via an architecture that uses endpoint resources more effectively and ultimately outperforms the competition on CPU and network utilization, giving you:

  • Automatic detection and response against an ever-growing variety of threats, including fileless and ransomware
  • EDR and MDR, SIEM integration, and open API for investigation and visibility across network.
  • An all-in-one lightweight agent through software as a service (SaaS) and on-premises options.
  • Features:

    Advanced malware and ransomware protection: Defends endpoints—on or off the corporate network—against malware, trojans, worms, spyware, ransomware, and adapts to protect against new unknown variants and advanced threats like cryptomalware and fileless malware.

  • Capabilities :
    1. High-fidelity machine learning (pre-execution and runtime)
    2. Behavioral analysis (against scripts, injection, ransomware, memory, and browser attacks)
    3. File reputation
    4. Web reputation
    5. Exploit prevention (host firewall, exploit protection)
    6. Command and control (C&C) blocking
    7. Device control


  • Advanced Capabilities :

    Endpoint Sensor (EDR)

  • Record detailed system-level activities and user actions
  • Detailed root cause analysis (RCA) shows source and spread of attacks.
  • Detect and analyze advanced threat indicators such as fileless attacks.
  • Rapidly respond to threats to limit the scope of impact and protect sensitive data before it is lost.









  • Vulnerability Protection (Virtual Patching)

  • Blocks known and unknown vulnerability exploits before patches are deployed.
  • Eliminates risk exposure due to missing patches
  • Extends the life of legacy and end-of-support (EOS) operating systems
  • Blocks all known exploits with intrusion prevention signatures.
  • Application Control

  • Prevents potential damage from unwanted or unknown applications (executables, DLLs, Microsoft’s App Store apps, device drivers, control panels, and other Portable Executable (PE) files).
  • Uses application name, path, regular expression, or certificate for basic application whitelisting and blacklisting.
  • Contains broad coverage of pre-categorized applications that can be easily selected from Trend Micro’s application catalog (with regular updates).
  • Ensures that patches/updates associated with whitelisted applications can be installed, as well as allowing your update programs to install new patches/updates, with trusted sources of change.
  • Data Loss Prevention (DLP)

  • Protect Data at Rest, In Use, and In Motion.
  • Empowers IT to restrict the use of USB drives, USB attached mobile devices, CD/DVD writers, cloud storage, and other removable media with granular device control and DLP policies.
  • Detects and reacts to improper data use based on keywords, regular expressions, and file attributes.
  • Educates employees on corporate data usage policies through alerts, blocking or soft-blocking, and reporting.
  • Reduces resource demand and performance impact with a single agent for endpoint security, device control, and content DLP.
  • Endpoint Encryption

  • Automates data management with self-encrypting hard drives (Full-Disk Encryption).
  • Encrypts data in specific files, shared folders, and removable media(Folder and File Encryption, and Removable Media Encryption).
  • Manages Microsoft Bitlocker and Apple FileVault.
  • Sets granular policies for device control and data management.
  • Security for MAC

  • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware.
  • Adheres to Mac OS X look and feel for positive user experience.
  • Saves time and effort with centralized management across endpoints, including Macs.
  • APEX CENTRAL (Centralized Security Management Console)

  • Ensures complete visibility and reporting across multiple layers of interconnected security.
  • Extends visibility and control across on-premises, cloud, and hybrid deployment models.
  • Central management and user visibility to improve protection and reduce complexity in security admin.
  • Access to actionable threat intelligence from the Trend Micro Smart Protection Network.

  • Security awareness (KnowBe4)

    Kevin Mitnick Security Awareness Training

    With the current advancement in cybersecurity hacks, and how it can affect greatly on the organization, company leaders must start to train their employees to protect their company from within, however old security awareness training doesn’t suffice anymore. Today, employees are the target for many attacks and must be educated on them properly, these attacks can vary from phishing, and spear phishing, spam, ransomware, malware, to social engineering.

    Training process

    Features

    Unlimited Use Smart Groups Custom Phishing& Landing Pages Simulated Attachments Advanced Reporting New Risk Scoring
    KnowBe4 offers 3 Training Access levels. With full access to our content library that has over 1000+ items, based on your subscription levels. Using this feature, you can use your employee’s behavior and their attributes to tailor attacks, training assignments, as well as remedial learning. KnowBe4 offers fully customizable phishing templates, allowing you to customize the scenarios based on personal information creating targeted “spear phishing campaigns”, and each template has its own custom landing page. The customized phishing templates can have simulated attachments, these attachments can be of the following formats: Word, Excel, PowerPoint, and PDF. As well as zipped versions of said file types. Detailed training report, and phishing campaigns, with a general overview of the last 5 campaigns. Using these reports you can get a holistic view of your entire organization The new innovative virtual risk officer functionality can help monitor your organization standing, showing you the organization risk score, by employee, group, the whole organization
    For more information please refer to the "Kevin Mitnick Security Awareness Training Datasheet" document in the document section

    Enterprise Security Awareness Training

    For a more comprehensive approach for training employees in an organization, Watad offers KnowBe4 Enterprise Security awareness training. Where employees will be trained on a new-school approach that integrates baseline testing using mock attacks, interactive web-based training, as well as continuous assessment through simulated phishing, vishing and smishing attacks.

    Features

    Unlimited Use Integrated Platform Random attack delivery Superior Tech Support Advanced Reporting New Risk Scoring
    KnowBe4 offers 3 Training Access levels. With full access to our content library that has over 1000+ items, based on your subscription levels. KnowBe4 platform integrate all functions in one easy to use GUI. Using said GUI you can start training campaigns and simulated attacks in minutes, customize your templates, and spoof your own domain for simulated CEO fraud attacks KnowBe4 provides the “double-random” message delivery, where phishing messages are sent during a specific period, and each employee can get different messages on a different time TAs an enterprise, you can get KnowBe4’s platinum tech support program that is known to have very short response times and excellent reputation Detailed training report, and phishing campaigns, with a general overview of the last 5 campaigns. Using these reports you can get a holistic view of your entire organization The new innovative virtual risk officer functionality can help monitor your organization standing, showing you the organization risk score, by employee, group, the whole organization
    For more information please refer to the "Enterprise Security Awareness Training Datasheet" document in the document section

    Advanced Phishing Features

    1. PhisheER”: lightweight Security Orchestration, Automation and Response (SOAR) platform, allows you to coordinate the threat response, and manage the high volume of potentially malicious messages reported by your users.
    2. Phishing Reply Tracking: allows you to track if any user in your organization replies to a simulated phishing attack ( email , SEI, etc) and can capture that reply.
    3. Social Engineering Indicators (SEI)
    4. USB Drive Test: allows you to test your employee’s response to unknown USBs, since statistics say that over 40% of employees plug them in their devices to find out what is stored inside.
    5. Geo-location: alets you see where your simulated attacks failures are on a map.
    6. Vishing Security tests:using IVR attacks over phone.



    Mail Security

    Email is mission critical to any organization. Through it, employees can send sensitive date from one another and exchange information. Thus, it became a target to many phishing and malware attacks. Let’s take for example the Verizon 2019 data breach attack, 94% of the malware was delivered by malicious emails, this incident made Gartner insist on the security and risk management leaders to revisit their email security architecture and assess it.
    Watad email security services offers you and your organization a blend of the best email security features from the top of the email security service providers such as FortiMail, TrendMicro, Cisco, and Barracuda.

    Flexible Deployment options:

    Appliance Virtual Cloud

    Features:

  • Multiple Domain support
  • Email encryption
  • Compatibility with cloud services (e.g., Office365)
  • BEC (Business Email Compromise)
  • Content Disarm and Neutralization
  • Bulk email categorization
  • Centralized Quarantine and per-user quarantine
  • DLP (Data Loss Prevention)
  • Prevents Reputation Loss
  • Outbound email filtering
  • Inbound email filtering
  • File type blocking
  • Antivirus
  • Bayesian analysis
  • Image analysis
  • Keyword blocking
  • URL Category Filtering
  • IP reputation analysis
  • Domain reputation analysis
  • Integration with real-time blacklists (SURBL/RBL)
  • Support Mail Authentication Standards
    1. Sender Policy Framework (SPF)
    2. Domain Keys Identified Mail (DKIM)
    3. Domain-Based Message Authentication (DMARC)
  • What can Watad email security can provide for you :

    Stop phishing and spam Detect and block advanced threat Protects against BEC
    Includes 24/7 technical support Enhanced security for office 365

    About Us

    Contact Us

    Follow Us