Managed IT Services
Enterprise-Level Cyber Protection
Comprehensive Cyber Security for SMB’s
Advanced Detection
Advanced detection, response and forensic capabilities to identify and isolate any active threats or suspicious activity, minimise damage and remediate or recover from an attack as quickly as possible.
Out-of-the-box and customisable
Out-of-the-box and customisable “profiles” that map to specific attack vectors and protection needs, with Cylon-controlled thresholds and real-time alerting to help Cylon create unique offerings for each of our customers.
24/7 threat monitoring
Access to the Cylon SOC, which provides 24/7 threat monitoring, remediation and other services. It also possesses the advanced knowledge and expertise needed to help Cylon effectively deliver security services to SMB customers.
Cyber Security
Packages and Deployment Options
Each profile explains exactly which technologies should be in place in a given environment, and offers advanced alerting and risk scoring so you can accurately measure risk on a per-site or per-device basis.
This information is used to identify security incidents, policy violations, fraudulent activity, and other threats. When such activities are identified, the Cylon SOC quickly takes action to mitigate the attack while providing advanced remediation documentation and recommended next steps.
The product leverages attack forensics and intelligent automation to identify advanced malware, exploits and script-based stealth attacks—and it’s backed by a $1M ransom ware warranty that Cylon can leverage to deliver true peace of mind to our customers.
24/7 remote monitoring
Remote Monitoring and Management
Think about what’s most important in your business today – does technology come to mind?
No matter what your core business is, there’s no denying that technology plays an important role in day-to-day operations. And as we grow more dependent on IT, it’s becoming increasingly-important that your network and systems are online and operating efficiently at all times.
That’s where our fully-managed approach to IT can help. With proactive remote monitoring and management, we’re able to keep tabs on your IT infrastructure 24/7, 365 days a year. When a problem does arise, our technical experts can quickly resolve it; in many cases before you’re even aware that there was a problem at all.
Remote Monitoring Key Features
24/7 monitoring of your network and IT infrastructure
virtual support
Help Desk
In the world of IT, problems happen. Computers crash, passwords are lost, email stops working, and the list goes on. Without proper technical support in place, these problems can bring your business to an abrupt and potentially damaging halt.
With Cylon Consulting’s Help Desk, you can enjoy peace of mind knowing that our certified technicians can quickly and efficiently resolve even your most complex technical problems.
- Microsoft and Apple desktop operating systems
- Microsoft Office and leading third-party applications
- E-mail applications and Web browsers
- Thin clients and virtual desktop infrastructure (VDI)
- Hardware and network troubleshooting
- Printer installation and support
- Mobile phones and tablets
- User administration
- Contract management
- Desktop performance problems
- Virus and malware infections
Help Desk key features
An Extension of our Remote Monitoring Solution
Not every support issue can be called a catastrophe…until it prevents you from being able to do your job.
We’re here to help you stay ahead of the curve, so you can focus on growing your business and to do so, we’ve adopted a proactive approach to network monitoring and IT maintenance. That’s why our help desk is a seamless extension of our remote monitoring platform. So when you call to report an issue, there’s a good chance we’re already aware of the problem you’re experiencing and are actively working to resolve it.
Protect Your Data
Back-up and Disaster Recovery (BDR)
Protecting your business is important. You buy locks for the doors and insurance to make sure you’re protected while your business grows. But what about your data?
Did you know that your data is arguably the most vital asset to your business? If critical information is lost or compromised, it can damage your business and close your doors for good.
In today’s technological landscape, you need to be able to protect your data from threats of all kinds. No matter if it’s hardware failure, extreme weather, a cyber-attack or simply human error—when disaster strikes, you need to be sure your data is safe and you’re back in business, fast.
Cylon Assist BDR is our backup and disaster recovery solution, designed to ensure your most vital information is secure and protected. What we offer isn’t just data backup: its complete business continuity. This means you can rest easy knowing your business will be back on its feet fast and your data will be completely recovered when you need it most.
Recovery Key Features
Advanced Protection. Built-In. Fully Managed.
Quickly Deploy & Support Mobile Devices in the Enterprise
Mobile Device Management (MDM)
IT organisations today need visibility into and control over the mobile devices that are entering the enterprise, whether they are employee owned or provided by the corporation.
Our mobile device management solution is powered by MaaS360 by IBM, the market-leading enterprise MDM platform. It provides a comprehensive set of capabilities so you can quickly and easily configure devices for enterprise access and ensure that the corporate data stored on all devices is secure. It supports all major mobile devices including iOS, Android, Windows Phone and BlackBerry devices, as well as Windows and OS X laptops.
Provision
Our MDM solution simplifies device setup with easy over-the-air (OTA) enrollment via SMS, email, or web. IT is automatically notified of new devices, which can be approved or quarantined to ensure policy compliance. It also streamlines the delivery and maintenance of corporate profiles, including Wi-Fi and VPN settings.
Integrate
Through our unique plug and play approach, we make enterprise system integration easy and straightforward. With Cloud Extender, you can securely integrate with all major email, calendar and contacts platforms including Exchange, Lotus Notes, and Office 365, plus Active Directory, LDAP and any required Certificate Authorities. Robust API’s ease and simplify the integration process.
Manage
Our MDM platform provides a unified console for managing all devices with centralized policies, automated enrollment, management, and reporting. Role-based access controls and default policies simplify IT tasks, while cross-platform app management allows a custom App Catalog and automatic app updates.
Secure
MDM delivers end-to-end security and compliance for mobile devices, enforcing passcode and encryption policies to protect sensitive data. It actively monitors devices for policy violations and can automatically take actions such as messaging users, blocking email, or wiping corporate data to maintain enterprise security.
Contain
Our “dual persona” BYOD approach separates personal and enterprise data on employee devices, creating a secure, trusted workspace for iOS, Android, and Windows devices. It provides strong data leak prevention and seamless workflows, allowing users to manage emails, contacts, calendars, apps, documents, and web browsing in one dedicated environment—regardless of device or ownership.
Monitor and Support
Access the Cylon SOC for 24/7 threat monitoring, remediation, and expert security services for SMB customers. MDM supports mobile workers with round-the-clock help desk capabilities, including device location, passcode resets, direct messaging, and a self-service portal for tasks like locating or wiping lost devices.
Get in touch
Secure your IT Environment with 24/7 Support
- Complete Backup Management
- 24/7 Support
- Project Security