Managed IT Services​

Managed IT Services including Remote Monitoring and Management (RMM), Cyber Security Management (CSM), Mobile Device Management (MDM), Back-up and Disaster Recovery (BDR) and Help Desk.
website image information management 1

Enterprise-Level Cyber Protection

Comprehensive Cyber  Security for SMB’s

Cylon Security provides the complete foundation needed to enhance and better-protect our SMB customers. Cylon Security can deliver a complete, end-to-end cyber security offering without customers having to build and maintain in-house operations.
frame 26 1

Advanced Detection

Advanced detection, response and forensic capabilities to identify and isolate any active threats or suspicious activity, minimise damage and remediate or recover from an attack as quickly as possible.

frame 11

Out-of-the-box and customisable

Out-of-the-box and customisable “profiles” that map to specific attack vectors and protection needs, with Cylon-controlled thresholds and real-time alerting to help Cylon create unique offerings for each of our customers.

frame 10

24/7 threat monitoring

Access to the Cylon SOC, which provides 24/7 threat monitoring, remediation and other services. It also possesses the advanced knowledge and expertise needed to help Cylon effectively deliver security services to SMB customers.

Cyber Security

Packages and  Deployment Options

Profile & Protect enables us to leverage pre-existing or custom-built profiles that map to specific threat types in order to define proper security strategies for each of our clients. This allows Cylon to stop selling “security” as a broad blanket concept, and start selling targeted offerings such as ransom ware protection, anti-phishing, insider threat detection and other services.

Each profile explains exactly which technologies should be in place in a given environment, and offers advanced alerting and risk scoring so you can accurately measure risk on a per-site or per-device basis.
Network & Compliance leverages industry-leading SIEM technology to collect, analyse and correlate information from network devices, endpoint logs and threat intelligence feeds.

This information is used to identify security incidents, policy violations, fraudulent activity, and other threats. When such activities are identified, the Cylon SOC quickly takes action to mitigate the attack while providing advanced remediation documentation and recommended next steps.
Endpoint rapidly identifies and halts even the most sophisticated cyber-attacks, minimizing harm and reducing risk to client endpoints.

The product leverages attack forensics and intelligent automation to identify advanced malware, exploits and script-based stealth attacks—and it’s backed by a $1M ransom ware warranty that Cylon can leverage to deliver true peace of mind to our customers.  

24/7 remote monitoring

Remote Monitoring and Management​

Think about what’s most important in your business today – does technology come to mind?
No matter what your core business is, there’s no denying that technology plays an important role in day-to-day operations. And as we grow more dependent on IT, it’s becoming increasingly-important that your network and systems are online and operating efficiently at all times.

That’s where our fully-managed approach to IT can help. With proactive remote monitoring and management, we’re able to keep tabs on your IT infrastructure 24/7, 365 days a year. When a problem does arise, our technical experts can quickly resolve it; in many cases before you’re even aware that there was a problem at all.

Remote Monitoring Key Features

24/7 monitoring of your network and IT infrastructure

We provide complete 24/7 monitoring of your network and IT infrastructure, and provide full problem resolution and troubleshooting for servers, desktops, and mobile devices. Our technical experts are constantly working behind the scenes to ensure your systems are running smoothly, and when a problem does arise we’ll jump in immediately to fix it.

virtual support

Help Desk

In the world of IT, problems happen. Computers crash, passwords are lost, email stops working, and the list goes on. Without proper technical support in place, these problems can bring your business to an abrupt and potentially damaging halt. 

With Cylon Consulting’s Help Desk, you can enjoy peace of mind knowing that our certified technicians can quickly and efficiently resolve even your most complex technical problems.

Help Desk key features

An Extension of our  Remote Monitoring  Solution

Not every support issue can be called a catastrophe…until it prevents you from being able to do your job.

We’re here to help you stay ahead of the curve, so you can focus on growing your business and to do so, we’ve adopted a proactive approach to network monitoring and IT maintenance. That’s why our help desk is a seamless extension of our remote monitoring platform. So when you call to report an issue, there’s a good chance we’re already aware of the problem you’re experiencing and are actively working to resolve it.

Protect Your Data

Back-up and Disaster Recovery (BDR)

Protecting your business is important. You buy locks for the doors and insurance to make sure you’re protected while your business grows. But what about your data?
Did you know that your data is arguably the most vital asset to your business? If critical information is lost or compromised, it can damage your business and close your doors for good.

In today’s technological landscape, you need to be able to protect your data from threats of all kinds. No matter if it’s hardware failure, extreme weather, a cyber-attack or simply human error—when disaster strikes, you need to be sure your data is safe and you’re back in business, fast.

Cylon Assist BDR is our backup and disaster recovery solution, designed to ensure your most vital information is secure and protected. What we offer isn’t just data backup: its complete business continuity. This means you can rest easy knowing your business will be back on its feet fast and your data will be completely recovered when you need it most.

Recovery Key Features

Advanced Protection. Built-In. Fully Managed.

We offer complete disaster recovery and cloud replication solutions to keep your business protected and resilient. Our fully managed and monitored service includes end-to-end backup management, continuous data protection, secure block-level encryption, cloud replication, and off-site virtualisation ensuring your critical data remains safe, accessible, and quickly recoverable whenever needed.

Quickly Deploy & Support Mobile Devices in the Enterprise

Mobile Device Management (MDM)

IT organisations today need visibility into and control over the mobile devices that are entering the enterprise, whether they are employee owned or provided by the corporation.

Our mobile device management solution is powered by MaaS360 by IBM, the market-leading enterprise MDM platform. It provides a comprehensive set of capabilities so you can quickly and easily configure devices for enterprise access and ensure that the corporate data stored on all devices is secure. It supports all major mobile devices including iOS, Android, Windows Phone and BlackBerry devices, as well as Windows and OS X laptops.

frame 48

Provision

Our MDM solution simplifies device setup with easy over-the-air (OTA) enrollment via SMS, email, or web. IT is automatically notified of new devices, which can be approved or quarantined to ensure policy compliance. It also streamlines the delivery and maintenance of corporate profiles, including Wi-Fi and VPN settings.

frame 48

Integrate

Through our unique plug and play approach, we make enterprise system integration easy and straightforward. With Cloud Extender, you can securely integrate with all major email, calendar and contacts platforms including Exchange, Lotus Notes, and Office 365, plus Active Directory, LDAP and any required Certificate Authorities. Robust API’s ease and simplify the integration process.

frame 48

Manage

Our MDM platform provides a unified console for managing all devices with centralized policies, automated enrollment, management, and reporting. Role-based access controls and default policies simplify IT tasks, while cross-platform app management allows a custom App Catalog and automatic app updates.

frame 48

Secure

MDM delivers end-to-end security and compliance for mobile devices, enforcing passcode and encryption policies to protect sensitive data. It actively monitors devices for policy violations and can automatically take actions such as messaging users, blocking email, or wiping corporate data to maintain enterprise security.

frame 48

Contain

Our “dual persona” BYOD approach separates personal and enterprise data on employee devices, creating a secure, trusted workspace for iOS, Android, and Windows devices. It provides strong data leak prevention and seamless workflows, allowing users to manage emails, contacts, calendars, apps, documents, and web browsing in one dedicated environment—regardless of device or ownership.

frame 48

Monitor and Support

Access the Cylon SOC for 24/7 threat monitoring, remediation, and expert security services for SMB customers. MDM supports mobile workers with round-the-clock help desk capabilities, including device location, passcode resets, direct messaging, and a self-service portal for tasks like locating or wiping lost devices.

Get in touch

Secure your IT Environment with 24/7 Support