Services

Vulnerability Management

Schedule a 15-Minute Discovery Call

Vulnerability Management as a Service

Cybersecurity should not be considered just a project. In order to meet ongoing compliance and regulatory requirements we have developed a multi-layered approach to your ongoing cybersecurity needs.

A one layered approach simply isn't enough. Everything we do is centered around 3 key layers of cybersecurity:

Cyber-Solid Foundation of policies, procedures, and plans.
 
Cyber-Smart Culture of employee awareness and institutional knowledge.
 
Cyber-Strong Technology that goes beyond traditional antivirus and firewalls.
 

Maintaining an ongoing cybersecurity program has traditionally been complicated and expensive. Our cybersecurity service changes the game, making cybersecurity simple, manageable, and affordable. Online, all the time, our cybersecurity as a service helps nonprofit and small business superheroes detect, protect, and defend.

See your cybersecurity data at a glance: health grade, alerts, reports, recommendations, products and services, users, devices, and more. Easy to access, easy to understand. Online, all the time.

Soc 2 Type 2 Attestation

We are proud to have received a clean SOC 2 Type 2 attestation report. This rigorous, independent assessment of our internal security controls serves as validation of our dedication and adherence to the highest standards for security, confidentiality, availability, privacy, and processing integrity. 

This is an important milestone but is in no way an end to our commitment to our customers and the security of their data. RoundTable Technology views security as the foundation upon which our products are built and upon which trust with our customers is earned and maintained. RoundTable Technology uses Drata’s automated platform to continuously monitor its internal security controls against the highest possible standards. With Drata, RoundTable Technology has real-time visibility across the organization to ensure the end-to-end security and compliance posture of our systems.soc2type2-1

 

 

What some of our customers have to say:

 

I can sleep a little better at night knowing our company is doing everything it can to protect itself.
Owner
Atlantic Cost Title
I can see the immense value in the layered approach. So simple, it just makes sense.
Pat Coughlin
Accounting Manager | Extec
As the sole person with a dedicated IT role in my workplace, Defendify is an invaluable tool in helping me assess and maintain an appropriate cybersecurity posture for my organization. I have access to vastly more knowledge on our current state and I can easily track our progress on our cybersecurity...
IT Associate
Writopia Lab
Cybersecurity

Vulnerability Management as a Service

Download PDF

 

Proactive Monitoring & Maintenance

Scheduled Maintenance and Updates

Servers & Network Infrastructure

Patch Management

Windows & Mac OS

 

Client Support

Dedicated Cybersecurity Advisor

Monthly Check-ins, Strategic Planning, Budgeting

Quarterly Reporting

Network, Security, Backup, Warranty, Inventory

 

Security & Backup

Managed Detection and Response (MDR)

24x7 Security Operations Center (SOC)

Email Threat Protection

Anti-Spam & Malware Filtering

 

SaaS Security Monitoring & Alerts

Microsoft 365, Google Workspace 

Assessments

Cybersecurity, Compliance, and Insurance Readiness

 

Phish Testing

Routine phish testing for staff with educational training for each failed test

Policy Template & Guidance

Access to our library of policy templates with guidance on creating your own

 

 Compromised Password & Account Scanning/Alerts

Monitoring of Internet including Dark web for compromised accounts and passwords

Vulnerability Management

Routine scanning and reporting of known vulnerabilities (Internal & External) 

 

 SaaS Backup

Microsoft 3665 (Email, OneDrive, Sharepoint, Teams), GSuite (Email, Calendar, Shared Drives)

Endpoint Security

Antivirus & Malware Protection with Machine Learning and Threat Detection 

 

 Workstation Backups for PCs

Cloud based backups for Windows Laptops and Workstations 

 Endpoint Detection & Response (EDR)

 

 

 

Training & Education

Quarterly Webinars

Topics include Project Management, Change Management, Email, Cybersecurity, Productivity, and more

 

Cybersecurity Tips & Tricks

Weekly Email Tips

Security Awareness Training for Personnel

Ongoing routine training with tracking and reporting for personnel, we also provide an annual live training for staff

 

 

Schedule a 15-Minute Discovery Call
 

Cybersecurity as a service provided by

defendify by roundtable logo

 

comptia logo

RoundTable is a proud partner with CompTIA

 

More questions?

Do not hesitate to contact us

Contact us