Three ways of approaching security

Our software-based approach to business security is the result of months of research and years of experience.

Three ways of approaching security

Our software-based approach to business security is the result of months of research and years of experience.

Keep your message flow clear

Spam Titan is a dedicated Business Email Spam Filter that uses advanced heuristic processing to detect and prevent malware and virus attacks through corporate email systems. With highly manageable rule sets, Spam Titan filters, scans, and processes email, blocking 99.99% of Spam and allowing each user, domain, and system, its own customisable block list.

This stand-alone program is licenced per mailbox and allows for better budgeting control than a traditional anti-virus package (for example traditional security software unnecessarily employs email scanning on servers and other devices not engaged with the email system).

 

More than anti-virus

Webroot is an advanced Threat Intelligence Service that scans and assesses URLs, IPs, files and applications to catch and prevent malicious attacks before they infect your network or endpoints. The Web Root cloud platform scans billions of IP addresses, and billions of URLs across millions of domains, and uses advanced machine learning to categorize each item and assess threat potential to your network, and to your business. More advanced than a traditional file scanning anti-virus product, WebRoot brings a powerful global approach to threat management and prevention and keeps your company endpoints safe. The financial cost and loss of employee productivity from seemingly small infections can be significant and WebRoot mitigates this risk as part of our multi-layered approach.

 

Some threats are closer than you think

Third Wall is an important addition to our security suite as it closes existing gaps in the defence against cyberthreats and manual threat injection. At its core, Third Wall applies 58 automated policies and security monitoring protocols that work at end-user device level. This application targets malicious on-device attacks that may be introduced by rogue employees, or through inadvertent use of infected portable media. Locking down computers to their essential business purpose provides a strong last line of defence after the core router’s firewall and the organisation’s anti-virus software.

Third Wall allows recording of every user logon and failed logon attempt with full reporting of suspicious activity and quick access to isolating and destroying data on stolen or compromised devices. Users can be restricted at device level from saving files to external locations including USB, external hard drives, optical disks and cloud locations not authorised by the organisation. This prevents data leakage of sensitive corporate information. Users are also restricted from loading and launching non-authorised programs and applications. A further useful tool is password control which allows for forced password length and complexity, forced password change, and enforced password protected screensavers to prevent illicit use of another user’s device.

Third Wall also allows classified blocking of social media sites.

Importantly, Third Wall’s extensive security settings allow for focussed user settings, from a fully locked device for production staff to minor restrictions for the executive team, all whilst creating an interrogable information trail.

 

A comprehensive suite

Digital Dexterity’s security suite is a triple threat to malicious attacks on your business. Along with firewalls, strong policies, forced updates of software, and well-trained employees, you can be certain that all precautions are being taken.