Service Details

PC support using True Owl’s Remote, Monitoring and Management (RMM) system will be provided. This includes the installation of critical updates for Windows Operating Systems, Apple Operating Systems, and Microsoft Office. True Owl’s RMM system will monitor all PCs (laptops/desktops/Macs) that are accessible for critical errors. Critical errors will automatically create a Service Ticket in True Owl’s ticket management system and will be addressed by a technician or True Owl’s automation server, which provides automatic response to resolve critical issues.

Identify and Assess Vulnerabilities

True Owl’s endpoint security proactively reduces threats by continuously assessing vulnerability risks. This includes rating the security risk of applications, identifying vulnerabilities, identifying rogue devices and taking proactive risk mitigating actions.
Prevent attacks with Next Generation Antivirus Engine (NGAV) True Owl uses a machine learning antivirus engine to block malware before they can execute. The kernel based NGAV is continuously updated to identify new malware.

Detect and Defuse Attacks in Real-Time

If an endpoint is compromised, True Owl’s service will detect and stop the attack in real-time. True Owl’s endpoint security protects data by stopping malware (including file-less malware) and other advanced attacks in real-time. As soon as suspicious process flows and behaviors are detected, True Owl’s endpoint protection immediately stops the potential threats by blocking outbound communications and access to the file system from those processes. These actions prevent data from being taken (data exfiltration), command and control (C&C) communications, file tampering, and ransomware encryption.

Respond and Repair

True Owl’s security operations center will utilize a wide variety of remediation tactics following an attack. These tactics include automated termination of malicious processes, removal of files, isolation of applications, and roll back of malicious changes

True Owl includes Dark Web Monitoring. The dark web monitoring platform combines intelligence with search capabilities to identify, analyze and proactively monitor for an organization’s compromised or stolen employee and customer data.
True Owl includes and recommends all computer users to participate in regular security awareness training. The Cybersecurity training program provides simulated phishing attacks and security awareness training campaigns, making your employees the best defense against cybercrime.

Secure passwords with a next-generation password management engine. Password folders help organize your passwords. Top security features include granular access control, version management and detailed activity logs all with ultra-secure, SOC 2-compliant platform.
True Owl will provide maintenance and support for existing hardware and software; this may include installed 3rd party software and line of business applications. True Owl will make a best effort to resolve as many issues as possible remotely and will come on-site in the event remote resolution is not possible. Automated support includes installation of patches, remediation for malware, failed services, drive clean-up (temp and unnecessary files), drive optimization, virus, malware, and spyware scans, defrags as well as hardware and software auditing. Errors that occur during the maintenance window-such as failed patch installation or machines that are unavailable-will trigger a service ticket to be automatically created in True Owl’s ticket management system. Projects or Enhancements outside the scope of the above to maintain the existing network are billed separately, including, but not limited to, setting up additional offices or system changes expanding beyond what is currently in use in the network. Projects outside the scope of the covered support will be discussed prior to incurring charges and will be billed at True Owl’s hourly rate for service.
True Owl will provide clients with monthly reporting. The report will detail resolved tickets, patching, antivirus performance, service availability and network reliability.
True Owl provides periodic meetings with clients to review ongoing issues, go over upcoming project work, discuss changes in vendors, advise on best practices, create budgets, and plan the technology roadmap for the next period. This will help clients stay aligned with current technology trends and standards.
NGFW that will protect your organization through advanced security features. Firewall 365 provides deep-packet inspection, intrusion prevention (IPS), advanced malware detection, and application control. Conventional firewalls only monitor traffic moving into, and sometimes out of, the network. These devices only look at packets, network addresses, and ports to determine if data should be allowed through or blocked. Hackers now hide malware inside application traffic, where the conventional firewall can’t see it.
Examines the content of data packets as they pass by a checkpoint on the network identifying and controlling applications– conventional firewall only identify ports, protocols and IP addresses in the packet header. Firewall 365 offers extensive visibility into application usage in real time, as well as trends over time. This visibility keeps malicous, risky and unwanted applications out of your network, exposing otherwise hidden threats within the data stream. Threats, such as attempts at data exfiltration, violations of content policies, and malware.
Protects against the latest known viruses, spyware, and other content-level threats. Advanced detection engines proven to prevent both known and polymorphic malware from getting inside your network. Real-time updates and signatures are added, providing millions of new AV definitions every week.
Restricts the Web content a user is authorized to access. It improves security, prevents objectionable activities, and increases productivity within an organization.
  • Filters the DNS request based on the domain rating
  • Blocks the DNS request for known command and control (C&C) domains
  • Local domain filter
Identifies malicious traffic and proactively blocks it from entering customer’s network. IPS monitors incoming traffic and inspects that traffic for vulnerabilities and exploits. If it detects issues, IPS can take the appropriate action–such as blocking access, quarantining hosts, or preventing access to external websites that could lead to a breach.
Enables individual users to access an organization’s network, client-server applications, and internal network utilities and directories without the need for specialized software. SSL VPNs provide safe, secure communication via an encrypted connection for all types of devices, regardless of whether access to the network is via the public internet or another secure network.
SD-WAN solutions enhance an organization’s capabilities by leveraging the corporate WAN as well as multi-cloud connectivity to deliver high-speed application performance. Firewall 365 consolidates SD-WAN, next-generation firewall (NGFW), and advanced routing to: accelerate network and security convergence, simplify WAN architecture, provide consistent network and security policies, and achieve operational efficiencies through automation, deep analytics, and self-healing.
  • Log Storage
    • Avid’s SIEM will store firewall logs for six-months. Firewalls typically store a day or less of data.
  • Network Activity
    • Visibility, correlation, automated response and remediation of network activity
  • Machine Learning & Statistical Methodologies
    • Machine learning and statistical methodologies to baseline normal behavior and incorporate real-time, actionable insights into irregular user behavior regarding business-critical data
  • Unified data collection and analytics from diverse information sources including logs, performance metrics, security alerts and configuration changes
  • Off-site backups of firewalls, emergency equipment replacement and rapid configuration modifications

Additional Services:

Additional PC Service is intended for users assigned a second pc (e.g., company provided laptop or home desktop) or PCs not assigned to a specific user (e.g., Conference Room PC or spare PC). Same support services are included as primary PC.

True Owl will set up monitoring parameters and thresholds using its Virtual Server Agent. True Owl will monitor agent status, Windows services state, performance counters and Event Logs 24/7. In the event of an alert, a service ticket will be generated. Tickets will be categorized as Critical, High or Normal. Once a ticket is generated, True Owl will work to resolve the cause of the alert.

True Owl will conduct scheduled and Ad Hoc maintenance activities, including server reboots, services restarts, patch management, hardware and software audit reports and Exchange defragmentation. Scheduled server health checks will be conducted based on Microsoft Best Practices Analyzer.

True Owl will deploy Endpoint Protection on all servers.

The Backup Agent performs backup and restore operations for server(s) located at customer’s location
The Backup Agent performs backup and restore operations for personal computer(s).
Cloud storage will be invoiced using 100GB increments.
Backup Disaster Recovery (BDR) Appliance provided by True Owl to be place in client’s server room that captures snapshots of client servers on a regular interval including its data, operating system application and configuration and replicates those images to a secure cloud location. In the event of a failed server or data loss True Owl will use BDR appliance to restore data on-site or at the cloud location.
A purpose-built compliance process for achieving continuous compliance with HIPAA, GDPR, CMMC, NIST (SP) 800-171 and Cyber Insurance policies.
Microsoft Office 365 licenses will be provided for each user as identified in the addendum.
True Owl helps you navigate the complexities of Cloud Migration, then helps you execute a seamless migration to the Cloud that is secure and cost-effective.