Skip to main content

Cloud Security

CyberHunter provides an advanced, managed Security-as-a-Service platform, which strengthens and unifies your on-premise, public, private, and hybrid cloud environments using an installed software agent

PROTECT MY CLOUD ENVIRONMENT

Windows Servers – 2012, 2012 (R2), 2016, 2019
Linux Servers – CentOS, RHEL, Ubuntu, Amazon Linux, Oracle Linux

The service scales security to public, private, and hybrid cloud environments, or on-premise.

The Center for Internet Security (CIS) Benchmarks™ offers proven configuration guidelines for various technology groups to safeguard operating systems, software and networks that are most vulnerable to cyber threats and attacks.

CyberHunter has adopted the CIS Benchmarks™ as the security baseline for Windows and Linux systems and assets.  With coverage in the following areas, CyberHunter’s cloud security offers unparalleled protection against cyber attacks:

  • Malware scanning and prevention
  • File Integrity Monitoring (FIM)
  • Host Intrusion Prevention System (HIPS)
  • Host Intrusion Detection System (HIDS)
  • Vulnerability Management
  • Logging
  • Cyber Threat Incident Detection & Response by our Security Operation Center (SOC)

If the CyberHunter standard protection layer is not enough, customers can opt for our highest security offering, the Complete Plan.  This plan is a fully hosted secure server that comes with all the Standard plan options plus the following:

  • Managed host-based firewall
  • Advanced Backup (VM or Fileset)
  • SSL VPN secure access to the host
  • Vormetric Data Security Manager (DSM) for the highest level of encryption for your critical data at rest (e.g. MySQL database encryption)
  • Enhanced CIS Benchmarks™ coverage over and above the Standard offering.

Cloud Security Questionnaire

To help us understand your specific needs please fill out the form below.

BE PROACTIVE.

Trust in a network device is very temporary. Be proactive and ensure you scan, test and hunt on a regular basis.

TRUST NOTHING.

Security teams should NEVER trust an endpoint or server until it can be PROVEN to be trusted.

MALWARE CAN GET IN.

Companies need to prepare and be ready to respond to advanced persistent threats.

Cyber Security & Pen Test Consultants in Canada, the US and the Caribbean