Invicta VPS

Stopping the bad guys in their tracks.

img-invicta

Enterprise-level cybersecurity protection for the small business

RESULTS announces a cybersecurity tool specifically for small businesses that rivals what the big guys have. Invicta (latin for invincible) VPS (stands for Vulnerability Protection System) is one of the most advanced cybersecurity tools available to small businesses today. When used in conjunction with firewalls, backup and antivirus tools, Invicta VPS provides security at a level that is compatible with most regulatory compliance requirements (HIPAA, FFIEC, PCI, NIST, etc.).

Invicta VPS is designed to prevent and detect Advanced Persistent Threats (APTs). These threats sit quietly, harvesting your company’s sensitive information, or even worse, your client’s information for weeks or even months. APTs can also move around within your network, gain administrative rights, and even access secure areas of your network. APTs are truly one of the worst things that can happen to a company.

Read how Invicta VPS saved a small Texas bank from becoming victims of ransomware

But don’t worry … we’ve got your back. Here’s how :

  1. Once installed on your network, Invicta VPS gets right to work, enforcing policies on workstations and servers to ensure that only legitimate changes and activities are permitted. It then continues to monitor every 5 minutes to verify compliance.
  2. Invicta VPS inventories each application scheduled to automatically start at boot or user login. When an anomaly is detected, Invicta VPS delivers remediation alerts to the RESULTS helpdesk for action.
  3. The network is scanned daily for failed login attempts, changes to permissions and administrative accounts, changes to network configurations, detected malware or “hidden” applications. Invicta VPS detects and automatically uninstalls unauthorized applications.
  4. Invicta VPS detects keyloggers, trojans, spyware, unauthorized registry changes, or other malicious activity.
  5. A weekly network scan detects security vulnerabilities on all network-attached devices. External vulnerability scans are run quarterly against public firewall IP addresses.
  6. An enhanced Ransomware detection system identifies malignant activity and immediately isolates the infected device and initiates corrective action.
  7. Lost or stolen devices can be locked down and data destroyed on first connection to the internet.
  8. All detected anomalies and alerts are forwarded to the RESULTS helpdesk for rapid remediation.
  9. All reportable events are captured and analyzed by the RESULTS helpdesk and actions logged in the client-viewable ticketing and Invicta VPS portals. Monthly detail reports are captured and stored for client access in the RESULTS ticketing portal. All reports are reviewed by RESULTS technicians and summarized in the monthly Proactive Health Report.

Get More Information