Call Today!
Security and Data Integrity
Willis Consulting gives security and data integrity top priority. With over 20 years of experience, we understand how important this is to each and every business, that is why we have developed a multiple layered security protection that keeps the bad things out and your data and systems safe.
Email Security
Our business class email is cloud hosted by Microsoft Exchange is which has both protection and redundancy.
Email Protection includes scanning, quarantine, tracking, and reporting.
Detection of Spam, Marketing, Phishing, Virus, URL, and dangerous attachments before they reach your Inbox.
Email Authentication checks for impersonation, false domain, DKIM, DLP signatures and SPF settings.
Email Recovery even if it is deleted from your "Deleted Items" folder.
Email Archiving compliance with regulatory agencies such as PCI, SEC, GLBA, HIPAA, HITECH, SOX or other. Your companies critical information is preserved and retrievable within seconds. Over 90% of all businesses will be involved in litigation, and non-archived emails are often inadmissible as evidence.
Mailbox Backup of every terminated employee for future reference.
Data and Systems Reduncancy
Our approach to data redundancy is to apply a three tier backup plan.
User Files - Using a cloud based sync service, all of your desktop, documents, pictures, etc. on each user computer has a version backup. Every time you save a file, a backup is automatically performed. If you overwrite or deleted any file you can recover any version you want.
Network Files / Databases - Using the most advanced algorithmic cloud backup service, your network files and databases receive a full-set backup kept for 8 days, 5 weeks and 12 months. This services can handle even the largest networks on the order of TB 's.
Virtual Appliances - VMware ESXi, Hyper-V, Virtuozzo Hybrid, Citrix XenServer and Oracle VM have there machine imaged once a week for quick recovery.
Network Security
Willis Consulting deploys Worry-Free Business Security Services with a Security Agent to protect your endpoints from modern threats.
Manage Security Agents using the Active Directory organizational unit (OU) structure allows discovery of unmanaged endpoints that have no Security Agent installed.
Application Control uses the kernel-level blocking method to block applications before execution on your corporate endpoints.
Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software.
Device Control regulates access to external storage devices and network resources connected to endpoints.
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats.
Firewall can block or allow certain types of network traffic by creating a barrier between the client and the network.
Smart-UPS Power Backup - The best decision you can make to ensure data integrity!
Extended-run models provide for a longer runtime during prolonged outages, to power critical servers, security and communications systems.
Network Interface allows the soft shut down of Virtual Appliance Servers when the power outage extends beyond the battery capabilities.