In order to keep up with the higher demand of protection and efficiency needed in any professional organization – without the high cost of having a technician designated to constantly monitor and update your computers and network. Managed Services for your organization gives our whole team the ability to look much deeper into all your systems as a whole.  As a VIP Managed Services Customer, you will receive priority service as well as the best pricing on all services and hardware/equipment.

Examples of the enhanced coverage provided under our new and improved service offerings are as follows – and note, when any of these warnings or failures are detected by our software agent, a ticket is automatically created in our system for our team to take immediate action!

Managed Workstations & Servers:

  • Antivirus up to date and functioning correctly on all systems with and alerting of any detected threats

  • Patches and security updates, bug fixes, etc. updated twice weekly (or immediately if there is an eminent threat to the environment) for Microsoft products, as well as antivirus and other necessary system processes and software such as Java, Adobe Reader, file compression utility, etc.

  • Stability of information system environment – continuous testing of network speeds and resiliency

  • Management of users, shares, permissions, print queues; hard drive monitoring, cleanup and defragmentation; auto-restart of problematic services; updates and maintenance of supported software such as java, .net framework, runtimes, pdf reader (some services may not be applicable)

  • All software changes are logged, blacklisted applications are flagged, whether installed by a user or by another process

  • Alerting of dangerous conditions such as low memory, hard drive failure or low disk space, unusual network communications, etc.

  • Disk defragmentation as well as other maintenance processes are run automatically (generally weekly) when fragmentation reaches a given threshold on any computer; continuous file corruption monitoring

  • Continuous monitoring of critical file server services, processes, directory structure

  • Backup status: monitoring and testing of successful backups (provided you have a supported managed backup solution)

  • Continuous monitoring for unusual activity among network users

  • Ensure supported critical software applications are functioning as designed on workstations (Microsoft Office, Bookkeeping Applications, Adobe, Java, etc.)

  • Weekly reboot of all systems – to include servers, ensuring they all boot properly, is done on weekends, ensuring a fresh start to your week

  • Continuous monitoring of bad processes and failure of running services on all computers and servers

  • There are over 1,200 monitors provided in our Managed Services system that we can customize and enable for any given computer or server

Office General:

  • Internet connectivity monitoring for efficiency and uptime

  • Security Appliance functionality of real-time intrusion prevention; updates and validity of current subscription (if applicable), firmware updates and backup, VPN accessibility

  • Wi-Fi functionality, security and efficiency, firmware updates and backup, basic configurations such as 2 customer-defined SSIDs for isolated secure and guest networks; troubleshooting for connectivity issues with devices covered by agreement; reporting and monitoring of signal strength, connected devices, etc.

  • Network printer management

  • Management of smart network switches for connectivity, efficiency and security; firmware updates and backup

Managed Antivirus / EDR:

  • Control access to websites as well as local networks and hardware with strict policies developed by MSP and client, which will be applied to and enforced on all machines.

  • Policies may be customized based on users as well as types and roles of computers.  

  • Real-time policy changes, reporting, scans and customization is performed by our technicians in our advanced cloud console.

  • Our Antivirus / EDR has been rated #1 for the last 6 years, best in protection and performance. 

  • It maximizes the protection against Ransomware, and is light years ahead of the industry in NEX-GEN behavioral heuristics.  

  • Several new add-on features are available including Email Security, Endpoint Detection and Response, Full Disk Encryption, and Pre-Execution AI Technology that enables our EDR to out-perform all NexGen and traditional antivirus applications.

Support, Ticketing and Alerts:

  • Alerts on any of the managed items above items automatically create tickets and notify our technical team, who work quickly to correct issues BEFORE they affect your productivity and efficiency! 

  • We are constantly writing and updating scripts and monitors to keep your systems running smoothly.  

  • Remote assistance during business hours is always available and is at our fingertips – with someone able to help within a couple of minutes of your ticket creation. Plus, many tasks can be performed in the background without us having to take over your screen and interrupt your users’ workflow.

  • Onsite tasks (if necessary) are always available as specified.  We will work with you to define your preferences in our agreement for any included hours, then additional time will be billed at your discounted rate.

  • Weekly or monthly detailed reports may be provided with an overview of service tickets that we have worked for your systems, network health, any deficiencies that should be addressed, etc.

  • We also have a ticket portal, where you may review and edit your organization's tickets.

Microsoft 365 for Business / Enterprise:

  • Includes online storage with flexibility for security and granular sharing to users inside or outside your organization

  • Email - Secure, reliable, easy to use, your professional email address - Build customer trust with professional email addresses. Create as many group mailing lists as your company needs, like sales@yourcompany.com.  All of your data, on all mobile devices.  Powerful iOS and Android apps. Across mobile and desktop, you can read and draft messages, documents, spreadsheets, etc. even when you don't have Internet, and they'll be sent or saved to your account when you're back online

  • Calendar - Integrated online calendars designed for teams, smart scheduling, accessible from any laptop, desktop, tablets and phones

  • Word - Powerful word processing, works with all popular file types, unlimited revision history

  • Excel - Advanced, fast online spreadsheets, works with all popular file types

  • PowerPoint - Beautiful presentations

  • Many other apps available depending on version

  • Optional Email Encryption provides a very simple way to send point-to-point encrypted emails to the recipient

  • Optional Advanced Email Security provides an additional layer of protection for you and your staff in order to block some of the most common, destructive threats delivered via email

Plenty of additional information on other proposed services such as the Password Vault, Cyber Security Training, Backups, etc. is available for us to send or speak with you about.

Other managed devices such as network firewall, switches, wi-fi access points, printers, etc. include firmware and controller updates, configuration backups, monitoring for network anomalies, management of users and broadcast networks (guest and secure), etc. Firewall Security Appliance management includes ongoing subscription for support as well as Gateway Antivirus and Intrusion Prevention Services, Content Filtering, VPN Capability, Failover WAN Capability, and more.

Below, you will find our Cyber-Pyramid, listing most all aspects and areas of protecting your infrastructure.

Your organization's cyber security needs will vary based on the type of business and data that is stored and/or transmitted/received on your various applications, platforms and infrastructure.  We will do our best to determine which state, federal or global regulations such as HIPAA, GDPR, FTC, etc. under which your business falls- and will make recommendations based on those requirements in addition to your internal policies and preferences.

We will conduct a Zoom meeting with our security experts and any other national partners identified as needed (based on your industry) in order to color-code the areas based on your current state of security...
The pyramid will have indicators as follows:
Red = Likely needed, but not Implemented
Yellow = Partially implemented, needs improvement
Green = Fully implemented and acceptably managed
Blue = Not necessary, applicable, or preferred at this time

Our goal is to get as much GREEN as possible into your infrastructure in order to keep you and your clients' data secure!

Here is an example of the pyramid…

Mainstream Technologies Cyber Pyramid


Below is a bit more info on specific services.

Network & Cloud Security
Your organization may or may not be subject to HIPAA and/or PCI Complaince, but it is a good guideline to follow in any case.  If you do accept credit cards and/or store patient data, MainStream Technologies can ensure that you meet the appropriate guidelines.

 

PCI Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain a secure environment. Essentially any merchant that has a Merchant ID (MID).

The Payment Card Industry Security Standards Council (PCI SSC) was launched on September 7, 2006 to manage the ongoing evolution of the Payment Card Industry (PCI) security standards with focus on improving payment account security throughout the transaction process. The PCI DSS is administered and managed by the PCI SSC (www.pcisecuritystandards.org), an independent body that was created by the major payment card brands (Visa, MasterCard, American Express, Discover and JCB.).

 

HIPAA Compliance

The Office for Civil Rights enforces the HIPAA Privacy Rule, which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; the HIPAA Breach Notification Rule, which requires covered entities and business associates to provide notification following a breach of unsecured protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used to analyze patient safety events and improve patient safety. 

MainStream Technologies is equipped with the various resources, knowledge and ability to assist in ensuring HIPAA Compliance for your organization.  We will conduct HIPAA assessments and audits, and make affordable recommendations which we can implement based on your budget and schedule. We can also manage and track continued compliance with various periodic inspections and continual real-time monitoring.

We will guide you through HIPAA security compliance and never leave you to question whether or not you're implementing HIPAA correctly. MainStream Technologies provides unmatched support and has been proven with our ability to do so. When you partner with us, you will love our detailed work and world-class support.