IT Security

Login systems has put together a portfolio of IT Security Services and Software to provide our customers with a robust, cross platform security architecture to protect them for the ever-present Cyber Security threat.

It’s not enough these days just to have one protection mechanism in place, its essential to have a Security architecture that protects your Business from every angle and in some cases overlaps to provide a rigid security posture from your End User devices right the way through to your office networks and cloud-based systems.

Login Systems adheres to and implements for its clients what is considered the benchmark for IT Security; the Essential 8.

Login Systems

What is The Essesntial 8?

SentinelONE End Point Detection
and Response

WatchGuard Firewall Security Platform

Advanced Threat Prevention

Penetration Testing & Vulnerability Scanning

Multi-Factor Authentication

Cybersecurity Awareness Training

Cloud-Based Web Filtering

What is the Essential 8? 

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies are the Essential Eight.

ACSC Essential Eight is eight prioritised strategies to help businesses protect themselves against a cyber-attack. Aimed at preventing malware delivery, mitigating cyber security incidents, and serving as a baseline for organisations to address different cybersecurity risks and defend their systems online. The Essential Eight is designed to protect Microsoft Windows-based Devices and internet-connected networks.

The Essential Eight Maturity Model, first published in June 2017 and updated regularly, supports the implementation of the Essential Eight. It is based on the ACSC’s experience in producing cyber threat intelligence, responding to cyber security incidents, conducting penetration testing, and assisting organisations to implement the Essential Eight.

The Essential 8 strategies cover:

  • Application Control
  • Applications Patch Management
  • Configure Microsoft Office macro settings.
  • User Application Hardening
  • Restrict Administrative Privileges
  • Operating Systems Patch Management
  • Multi-Factor Authentication
  • Daily Backups of all Data
SentinalONE End Point Detection and Response
SentinelOne Logo

SentinelONE End Point Detection and Response

SentinelOne EDR is a comprehensive endpoint security solution that provides organizations with advanced threat detection and response capabilities. Here are some of the benefits of using SentinelOne EDR:

› Real-time Threat Detection and Response

SentinelOne EDR provides real-time threat detection and response capabilities, allowing security teams to detect and respond to advanced threats quickly and efficiently. The solution collects and analyzes endpoint data, network traffic, and user behavior to detect anomalous activities that could indicate a security breach.

› Automated Incident Response

SentinelOne EDR automates incident response processes, reducing the time to detect and respond to security incidents. When a potential threat is detected, the EDR solution automatically initiates incident response workflows, such as isolating the affected endpoint, blocking malicious traffic, and alerting security teams.

› Forensic Investigation Capabilities

SentinelOne EDR provides forensic investigation capabilities, allowing security teams to conduct deep forensic investigations into security incidents. The solution collects detailed endpoint data, network traffic, and user behavior data, providing security teams with the information they need to effectively investigate and respond to security incidents.

Watchguard Firewall Security

WatchGuard Firewall Security Platform

WatchGuard’s award-winning Firebox security platform not only provides the most complete suite of unified security controls on the market today, it has consistently been the first to offer solutions for addressing new and evolving network threats including advanced malware and ransomware. Our unique product architecture enables small and midsize businesses to leverage best-in-class security services – from URL filtering and intrusion prevention to application control and ransomware prevention, minus the cost and complexity of multiple single-point solutions.

The WatchGuard Security Platforms Core Features are:

› Intrusion Prevention

Intrusion Prevention Service uses continually updated signatures to scan traffic on all major protocols, providing real-time protection against network threats, including spyware, SQL injections, cross-site scripting, and buffer overflows.

› URL Filtering

In addition to automatically blocking known malicious sites, WatchGuard WebBlocker delivers granular content and URL filtering tools to block inappropriate content, conserve network bandwidth, and increase employee productivity.

› Gateway AntiVirus

Leverage our continuously updated signatures to identify and block known spyware, viruses, trojans, worms, rogueware and blended threats – including new variants of known viruses. At the same time, heuristic analysis tracks down suspicious data constructions and actions to make sure unknown viruses don’t slip by.

› Reputation-Based Threat Prevention

A powerful, Cloud-based web reputation service that aggregates data from multiple feeds to provide real-time protection from malicious sites and botnets, while dramatically improving web processing overhead.

› Application Control

Allow, block, or restrict access to applications based on a user’s department, job function, and time of day. It’s never been easier to decide who, what, when, where, why and how applications are used on your network.

› Predictive Protection

IntelligentAV features a powerful machine-learning engine that provides protection against evolving malware, with industry tests demonstrating a Predictive Advantage of more than two years. IntelligentAV is trained to identify threats by breaking down millions of files into their fundamental building blocks, and then examine the millions of characteristics in each file for indicators of malicious intent. The net result is a series of statistical algorithms that can classify any file against the statistical fingerprint of malicious/benign files to determine whether a file is safe to run before it is executed. This process is automated to deliver results within fractions of seconds, and is done in real time.

› APT Blocker

WatchGuard APT Blocker focuses on behavioural analysis to determine if a file is malicious, identifying and submitting suspicious files to a cloud-based sandbox where the code is emulated, executed, and analysed to determine its threat potential. If the suspected file is found to be malicious, APT Blocker quickly takes action to ensure your network and digital assets stay secure.

Advanced Threat Prevention

Advanced Threat Prevention

Login Systems unitises a suite of analysis tools designed to defend against advanced threats that use known and unknown attack vectors. ATP augments more common security solutions aimed at repelling known intrusion strategies.

Advanced threats are those that seek to surreptitiously gain access to a network and remain, undetected, in that network for months or even years, exfiltrating large amounts of data, conducting espionage, and/or causing significant damage.

By incorporating a lead ATP solution into your security stack, you harness three critical advantages:

  • Threat Visibility Everywhere: In leveraging multiple threat detection techniques at once, ATP delivers deep visibility into all network traffic.
  • Advanced Malware Detection: ATP helps secure your devices against threats that have been engineered to evade standard security tools.
  • Lower False Positives: ATP can greatly improve the accuracy of your alerts, which means your security teams can focus on a smaller set of actual intrusions.

Penetration Testing & Vulnerability Scanning

Login Systems provide a as service a comprehensive Penetration Testing & Vulnerability Scanning assessment.

Login Systems utilises industry leading testing tools that works seamlessly with your technical environment to test your systems for security Vulnerability and Emerging Threats, which we proactively check your systems for newly discovered vulnerabilities soon after they are disclosed.

Login Systems utilises tools that use same underlying scanning engine that the some of the largest corporations in the world use, they produce high quality security checks and continuously monitor for a spectrum of vulnerabilities, including web-layer security problems (such as SQL injection and cross-site scripting); infrastructure weaknesses (such as remote code execution flaws); and other security misconfigurations (such as weak encryption, and services that are unnecessarily exposed). In total the Penetration Test & Vulnerability Scans a large and comprehensive list of all over 140,000 security weakness and vulnerability.

Why do a Penetration Test?

The purpose of penetration testing is to help businesses find out where they are most likely to face an attack and proactively shore up those weaknesses before being exploited by cyber criminals.

Penetration Testing & Vulnerability Scanning
Multi-Factor Authentication

Multi-Factor Authentication

Login Systems can help secure all your Internet facing applications and services by provide industry standard

Multi-Factor Authentication:

› What is Multi-Factor Authentication (MFA)?

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong user access policy. Rather than just asking for a username and password, MFA requires one or more additional verification factors, which decreases the likelihood of a successful cyber-attack.

› Why is MFA Important?

The main benefit of MFA is it will enhance your organization’s security by requiring your users to identify themselves by more than a username and password. While important, usernames and passwords are vulnerable to brute force attacks and can be stolen by third parties. Enforcing the use of an MFA factor like a thumbprint or physical hardware key means increased confidence that your organization will stay safe from cyber criminals.

usecure – Cybersecurity Awareness Training for Businesses

Cyber security is a vital skill for any organisation, but it can be challenging to train your staff effectively and efficiently. That’s why usecure offers a comprehensive and flexible solution that helps you create a cyber-aware culture and reduce your cyber risk.

usecure is a cloud-based platform that delivers engaging and personalised cyber security training to your employees. With usecure, you can:

  • Assess your staff’s cyber security knowledge and behaviour with automated phishing simulations and risk assessments.
  • Deliver bite-sized and interactive courses that cover the most relevant and up-to-date cyber threats and best practices.
  • Track and measure your staff’s progress and performance with real-time dashboards and reports.
  • Customise and automate your training campaigns to suit your organisation’s needs and preferences.

By using usecure, you can save time and money, improve your compliance and reputation, and enhance your staff’s cyber security awareness and skills. usecure is trusted by thousands of organisations worldwide, from small businesses to large enterprises, across various industries and sectors.

usecure logo
What are the benefits of usecure?

usecure is a comprehensive and user-friendly platform that offers four key components for effective cyber security training:

  • uLearn: an adaptive learning system that delivers engaging and relevant micro-learning courses to your staff, based on their individual knowledge gaps and learning preferences.
  • uPhish: a phishing simulation tool that tests your staff’s ability to spot and report malicious emails, and provides instant feedback and remediation tips.
  • uPolicy: a policy management tool that helps you create, distribute, and track your organisation’s cyber security policies, ensuring compliance and accountability.
  • uBreach: a data breach monitoring tool that alerts you if any of your staff’s email addresses or passwords have been compromised in a data breach, and advises you on how to secure your accounts.

These components work together to create a holistic and personalised cyber security training program that increases your staff’s awareness and skills, reduces human error, and protects your organisation from cyber threats.

DNSFilter

DNSFilter: A Cloud-Based Web Filtering and Threat Protection Service

DNSFilter is a cloud-based web filtering and threat protection service that allows users to control, monitor, and secure their network traffic. DNSFilter uses artificial intelligence and machine learning to analyze domain requests and block malicious and unwanted content in real time. DNSFilter offers the following features and advantages:

  • Fast and reliable DNS resolution
  • DNSFilter operates a global network of servers that provide fast and reliable DNS resolution for any device, anywhere. DNSFilter uses Anycast routing to direct queries to the nearest server, reducing latency and improving performance. DNSFilter also supports IPv6, DNS over HTTPS, and DNS over TLS protocols for enhanced security and privacy.
  • Flexible and granular web filtering
  • DNSFilter allows users to create custom policies and rules to filter web content based on categories, domains, and keywords. Users can also whitelist or blacklist specific domains or subdomains, and apply different policies to different groups, devices, or networks. DNSFilter supports over 140 categories and subcategories, and updates its database daily with millions of domains.
  • Advanced threat protection
  • DNSFilter protects users from phishing, malware, ransomware, botnets, and other online threats by blocking access to malicious domains and IP addresses. DNSFilter uses artificial intelligence and machine learning to analyze domain requests and detect anomalies and patterns that indicate malicious activity. DNSFilter also integrates with third-party threat intelligence feeds and allows users to report false positives or negatives.
  • Comprehensive and actionable reporting
  • DNSFilter provides users with comprehensive and actionable reports and dashboards that show the web activity and security status of their network. Users can view and export data on queries, requests, blocks, categories, domains, devices, locations, and more. Users can also set up alerts and notifications for policy violations, security incidents, or network issues.