Cybersecurity
Digicel Business Protect
Simpler, Smarter, Cyber Security
Behind Digicel Business Protect
Digicel Business Protect is a purpose-built Managed Cybersecurity Provider and hardened 24/7/365 Security Operations Centre (SOC) located internationally United States and Ireland staffed with highly trained cyber resources.
Cybersecurity is what we do. All-day, every day. With a complete portfolio of cybersecurity solutions and related managed services, it makes it easy to align with Digicel Business Protect no matter what your current needs are.
From AI driven SOC managed services and vulnerability assessments to full Red Team engagements. The Digicel Business Protect Team can help in identifying and implementing controls needed to manage and mitigate risks within your environments, delivered from our purpose-built Cyber centres.
Digicel Secure Operation Centres
Digicel Business Protect is a purpose-built and hardened 24/7/365 Security Operations Centre (SOC) located throughout the Caribbean, United States and Ireland staffed with highly trained cyber resources.
Cybersecurity is what we do. All-day, every day. With a complete portfolio of cybersecurity solutions and related managed services, it makes it easy to align with Digicel Business Protect no matter what your current needs are.
With full visibility, prevent breaches, detect and stop threats fast and automate your network and security operations.
Next Generation Firewalls go beyond the expected prevention and access control functions of a traditional firewall in network protection.
Managed NGFW solutions give your organization deep visibility into potentially malicious file activity across users, devices, networks and infrastructure.
Organizations large and small can use this solution, especially if there are users connecting to a network, including the Internet.
Within every business sector, once an organization has a network, a level of protection for company assets can be provided by employing this solution.
Why Use Managed Next-Generation Firewall?
Cost Savings
Save on costs by extending your ICT Security Team.
Reduce Risks
Minimize financial loss due to downtime or theft. Maintain business continuity and secure sensitive company and customer data.
Transparency
With clear reporting and responsive controls, Digicel Managed ICT Security makes management easy and traceable down to every last user.
Premium Partner
Managed ICT Security is offered using best-of-breed products from our industry-leading partners.
Managed Solution
Drive cost efficiencies by outsourcing end to end management to Digicel’s technical experts, allowing in-house IT staff to focus on business operations.
Features
NGFW Support
NGFWs support deep-packet inspection, intrusion prevention (IPS), application control, and increased network visibility.
Malware Protection
Includes advanced malware protection that addresses threats and tracks and contains malware infections.
Firewall Security
Security features of a firewall such as monitoring of traffic entering and exiting your network.
Detect vulnerabilities, update and patch gaps in your IT and network infrastructure. Seal and protect all business and customer data.
Blanket your network and IT Infrastructure with our Managed Breach Detection Service, for peace of mind while you manage your business.
It collects vulnerability data, seeks out gaps and provides insights to help patch and secure your business devices, customer and company data.
This service sits on top of your architecture including firewalls, servers, network equipment, endpoints and even printers, collecting data to inform measures that can protect your network.
Organizations with complex networks may see the most benefit from the Breach Detection Service as there may be many gaps that can be breached.
Why Use Breach Detection Services?
Cost Savings
Save on costs by extending your ICT Security Team.
Reduce Risks
Minimize financial loss due to downtime or theft. Maintain business continuity and secure sensitive company and customer data.
Transparency
With clear reporting and responsive controls, Digicel Managed ICT Security makes management easy and traceable down to every last user.
Premier Partner
Managed ICT Security is offered using best-of-breed products from our industry leading partners.
Managed Solution
Drive cost efficiencies by outsourcing end to end management to Digicel’s technical experts, allowing in-house IT staff to focus on business operations.
Features
Infrastructure Monitoring
Analyzes infrastructure to detect breaches, vulnerabilities and architecture gaps via monitoring.
Real-Time Reporting
Delivers real-time reporting and profiling of all devices on your network.
Threat Assessment
Uses data from event collectors and other methods to detect and assess breaches and threats immediately.
Threat Alerts & Solutions
Alerting to threats is combined with remediation and repair services.
Ethical Hacking for organisations who truly want to address the gaps and challenges of IT Security.
Penetration testing involves simulating breaches of any number of application systems (e.g. APIs, frontend/backend servers) to uncover vulnerabilities, such as network areas that are susceptible to incoming attacks.
Insights provided by the penetration test can be used to fine-tune your security policies and patch detected vulnerabilities. It is the best way to bring focus to improving cyber defenses by checking your infrastructure regularly for vulnerabilities.
Organizations with complex networks may see the most benefit from accessing the Penetration Testing Service as there may be vulnerable areas that require attention.
As time goes on and more devices become network capable and network connected, the need for Penetration Testing services will increase, no matter the business.
Why Use Penetration Testing?
Cost Savings
Save on costs by extending your ICT Security Team.
Reduce Risks
Minimize financial loss due to downtime or theft. Maintain business continuity and secure sensitive company and customer data.
Transparency
With clear reporting and responsive controls, Digicel Managed ICT Security makes management easy and traceable down to every last user.
Premier Partner
Managed ICT Security is offered using best-of-breed products from our industryleading partners.
Managed Solution
Drive cost efficiencies by outsourcing end to end management to Digicel’s technical experts, allowing in-house IT staff to focus on business operations.
Features
Remediation Services
These professional services sessions help to identify areas for reversing or stopping attacks (remediation).
Patching Recommendations
Test results are documented with formal recommendations for vulnerability patching.
Address Growing Business Needs
It can suggest a host of solutions to address growing business security needs.
Certification Standards
This service assists your organization to get your infrastructure to certification standards.
Manage all endpoints from one central console with Unified Endpoint Management.
Managed Endpoint Security is software that is installed onto your laptops, PCs, servers, tablets and mobile devices. It provides control through setting policy and restricting certain services on mass amounts of devices.
Managed Endpoint Security provides full monitoring of devices that access business critical data from anywhere. Any business that needs to manage usage of laptops, mobiles and other smart devices can find Managed Endpoint Security to be useful.
From start-ups to mature businesses, to firms that have moved to entirely remote or hybrid operations, all company types can benefit greatly from a Managed Endpoint Security solution.
Why Use Managed Endpoint Security?
Cost Savings
Manage costs and reduce Total Cost of Ownership with predictable monthly charges and reduced communication expenses with little to no upfront costs.
Warranty
Hardware replacement for Digicel- provided hardware for the duration of the contract.
Transparency
With clear reporting and responsive controls, Digicel Managed ICT Security makes management easy and traceable down to every last user.
Premier Partner
Managed ICT Security is offered using best-of-breed products from our industry leading partners.
Managed Solution
Drive cost efficiencies by outsourcing end to end management to Digicel’s technical experts, allowing in-house IT staff to focus on business operations.
Features
Endpoints Overview
Provides full overview of endpoints and supports alerts for critical issues and potential attacks.
Data Segmentation
Uses segmentation so business and personal data are separated to minimise data leakage.
Handset Configuration
A simple application allows you to update or configure any handset or group of handsets.
Remote Wiping
It enables location of a mobile device if stolen or lost, and remote wiping of corporate data.
Threat Isolation
Support is provided in the form of threat isolation and remediation when needed.
The Digicel Business Protect Breach Detection Service (BDS) couples' people & process with bleeding edge technology providing an enterprise-grade security solution. The service features real-time threat detection, NG-SIEM and response. Which delivers high fidelity alerts with context and the ability to remediate from our Security Operation Centres (SOC).
Why Use Our Digicel Business Protect Breach Detection Service (BDS)
24/7 Real-time SOC Monitoring, Investigating Alerting, Reporting & Support
Kill Chain Visibility and Enterprise Compliance Reporting
Supervised & Unsupervised Machine Learning
Zero Day Threat Detection, File Sandboxing & Deep Packet Inspection
Extended Detection & Response (XDR)
How It Works
Service Made Simple
Appliance - Data - SLA Line-Up
Virtual Appliances for Deployment
Digicel Business Protect Portal
Process. Process. Process.
Great people do not make a SOC. Great tools do not make a SOC. Our relentless pursuit of a high touch client experience and constant innovation is redefining Security Operations Centre.
Consolidate Your Security Stack with One Platform. One View.
One Platform, One Login, One View, with Endless Integrations
The Digicel Central Platform delivers real-time single view and management across your security practices. Simply click on the Services below and let us help you identify the gaps in your security journey. Whether you adopt our products and services or integrate your own cyber investments, the Digicel Central platform mitigates risk with single points of failure and adapts to any change control or technology refresh plans.
The Digicel Central platform gives our customers the freedom to integrate their existing security stack into one single view. For hybrid security products and services managed by the customer or 3rd party vendors, Digicel Central brings everything into one central location in real-time. Delivering data aggregation, collaboration, improved productivity and ability to share across different users, departments and customers.
Dashboards
Integrate with out of the box templates or be creative by designing and building your own security dashboards integrated with your source applications and data to keep your target users updated, informed, and engaged.
Visuals
Represent your security data through drag and drop visualisations. The visual library represents numerous ways to capture and present your data layers throughout the business and customer views.
Reporting
Instant and on-demand security analytics to make the right decisions. Just like the dashboards, the reporting module helps you build, share, and schedule daily, weekly, and monthly critical information to your recipients.
Vendor Ready Connectors
The Digicel Central platform comes with connectors from the leading security enterprises. Simply configure from our template dashboards, visuals and reports or build your own connectors and data visualisations.
Digicel Central Platform Packages
Hosting Choice On-Premise Cloud & Hybrid
With multiple options to deploy Digicel Central onto your infrastructure, our cloud or co-location integration - ensuring optimum performance and security. Digicel Central can run under Kubernetes, Docker containers and virtual appliances.
Secure Platform
Digicel Central application and architecture security are under regular penetration testing with our software assurance support. With today's emphasis on cyber-attacks, our product must meet industry standards and compliance. SSL 256-bit encryption, with secure authentication options: Oauth2, SAML, 2-factor, OTP and JWT.
Digicel Business Protect Trust
Great people do not make a SOC. Great tools do not create a SOC. Our relentless pursuit of high integrity processes blended with great people and machines is redefining Security Operations Centre.
Proactive cyber monitoring by our analysts 24 hours a day, seven days a week from our hardened block wall facilities across the Caribbean, US, and UK/Ireland is where the cybersecurity monitoring and investigation occurs. 100's of hours in documentation and process building to enable a predictable and repeatable customer experience.
SOC TECHNOLOGIES
Superior Cyber solutions. NG-SIEM, Vulnerability Scanning, Remote Access, IoT, and SOAR applications fully managed by our SOC. Pre-configured for you and deploys in minutes. Several leading security apps in one appliance all fully managed by the Digicel Business Protect SOC, creating the world’s first converged security platform utilising best of breed security applications, one centralised and fully managed tool.
INDUSTRY CERTIFIED EMPLOYEES
At Digicel Business Protect, we only employ the highest standard of security talent throughout each SOC location. Digicel Business Protect resources are fully vetted, industry certified and are encouraged to pursue continuous development in their professional area through our training and development programmes.
SOC LOCATIONS
24/7 SOC BENEFITS
Customer Success Manager
Monthly Security Briefing
Save Time and Money
Built for the channel
Optimised for speed
Always on
No Cost. No Pressure. Education & Options.
Digicel Business Protect has served over 130 clients, and we have seen it all. We have seen clients with lots of thought, resources, and tools in their environment, and we have seen clients with nearly nothing in place to protect their assets, people, and data.
To help guide our clients, we provide a no-cost cybersecurity posture assessment that skips the marketing fluff and sales pitches. With a 60 minute remote interview, Digicel Business Protect delivers an easy to understand summary of your security posture with options based on the industry you are in, where your people are and where your data is.
Priced for Every Business On The Planet
The assessment provides categorical recommendations or validation of what you have in place. Many of the clients that have done the assessment consistently ask for a refreshed assessment each quarter as they use it to help educate their board and deliver a cybersecurity roadmap to the organisation. Put our expertise to work at no cost or obligation and let us help validate your posture or provide options to improve your current situation.
Scheme unable to copy
Priced for Every Business On The Planet
The assessment provides categorical recommendations or validation of what you have in place. Many of the clients that have done the assessment consistently ask for a refreshed assessment each quarter as they use it to help educate their board and deliver a cybersecurity roadmap to the organisation. Put our expertise to work at no cost or obligation and let us help validate your posture or provide options to improve your current situation.
Test Types
PCI Compliance
Straight Forward PCI Enablement Solutions
PCI Compliance Enablement
If you receive and store credit card information, you are likely subject to PCI compliance regulations, and there are several cybersecurity controls and steps to take. Digicel Business Protect works with many organisations required to achieve and maintain PCI compliance. We regularly provide assessments, deploy solutions, add 24×7 security monitoring, and provide reporting to our PCI related clients.
Storing data securely
Many PCI requirements can be satisfied by deploying a SIEM solution which Digicel Business Protect has made easy by supporting many best of breed SIEM solutions and providing its SOC In a Box solution that includes built-in PCI compliance reports. If you have PCI requirements, contact us to see how we can quickly and cost-effectively enable the reporting you need for compliance.
HIPAA Compliance
End-to-End HIPAA Ready Solutions
HIPAA compliance doesn’t have to be hard or incredibly expensive. Digicel Business Protect has extensive experience working with healthcare organisations, including hospitals, clinics, and business process outsourcers in the healthcare industry. Digicel Business Protect provides multiple SIEM solutions and related security services to help enable healthcare organisations to achieve HIPAA compliance efficiently.
Addressing Your HIPAA Compliance Requirements
Digicel Business Protect offers turnkey HIPAA compliance reporting for your in-scope networks and assets that can be regularly scheduled and provide role-based access control to your auditor, who may want to access various reports automatically. Also, we offer 24×7 monitoring solutions to help augment the already burdened staff within these organisations to identify early indicators of compromise and avoid events with severe consequences for the organisation.
GDPR
Protecting data, privacy, and awareness across all industries
What is GDPR?
GDPR or the General Data Protection Regulation is a law passed by the European Union that all country states and the UK have agreed to adhere to. Any company that processes or retains European citizen data is subject to enforcement. With such a wide net being cast, this regulation is a fantastic opportunity for MSPs to offer a new lucrative value-added offering.
Compliance Process Automation
Digicel Business Protect GDPR Manager automates the production of mandatory reporting under GDPR, including the results from monthly scans designed to uncover GDPR related network issues and potential breaches.
- GDPR Evidence of Compliance
- Data Protection Impact Assessment
- GDPR Evidence of Compliance
- Risk Treatment Plan
ISO27001
Driving efficacy and regulatory compliance across the enterprise.
Our Strategy
There are many reasons why organisations might consider ISO 27001. Organisations are under increasing pressure to demonstrate effective Information Assurance from regulators, employees, customers, legislative & enforcement bodies, business partners and prospective customers (in the form of tender requirements). Increasingly, the business that cannot easily demonstrate effective IA is the business that will be excluded from tenders, attract the regulator's interest, and, in general, find itself under increased and increasing scrutiny.
Why is ISO so important for a company?
ISO or the International Standards Organization is an independent body that provides standards of the organization. In terms of standard, we can define it as quality, safety and efficiency of the products or services provided by the businesses. ISO 9001 certification outlines the importance of high-quality goods and services. Also, when you find an increased market rate or high struggle in being differentiated, then ISO is a key that helps you sustain and nurture in the market. Contact one of our security advisors today to discuss how we can help you with your certification process no matter what stage your at. The ISO certificate helps to improve your business credibility and authority as well as the overall efficiency of the business. When your organization is ISO certified, it has so many benefits to include with.
Digicel Business Protect Health Check Assessment delivers your security score strengths and weaknesses with actionable recommendations to improve your overall security posture. We benchmark and evaluate each customers Network/Domain looking to protect and enhance the ability to respond to any type of security breach. Chat with one of our security advisors to understand how the Health Check Assessment can help you reduce risk, minimize breach impact, and protect against future attacks.
Digicel Business Protect Health Check Reports
The following assessment delivers industry standard reports to evaluate and action.
Security Risk Report
This report includes a proprietary Security Risk Score and chart showing the relative health (on a scale of 1 to 10) of the network security, along with a summary of the number of computers with issues. This powerful lead generation and sales development tool also reports on outbound protocols, System Control protocols, User Access Controls, as well as an external vulnerabilities summary list.
Security Management Plan
This report will help prioritize issues based on the issue's risk score. A listing of all security related risks are provided along with recommended actions.
Consolidated Security Report Card
The Consolidated Security Report Card assesses individual computers at a high level based on various security criteria. Devices discovered on the network are assigned an overall score, as well as a specific score for each of the assessment categories detailed in the report card. The scores are represented as color-coded letter grades ('A' through 'F'). The report card provides a relative measure as to how well a computer complies with security best practices.
Client Progress Report
The Progress Report allows MSPs to showcase the value of their service offerings to their clients. Information is delivered through easy-to-follow charts that illustrate the continuous improvements to the client’s security profile and can validate the need for additional resources. MSPs can customize the documents by including or excluding sections, changing text, and adding boilerplates. The Progress Report is available for users with subscriptions to the Network Assessment Module, the Security Assessment Module, and Reporter.
Security PowerPoint
Use our generated PowerPoint presentation as a basis for conducting a meeting presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.
External Vulnerabilities Scan Detail Report
A comprehensive output including security holes and warnings, informational items that can help make better network security decisions. This is an essential item for many standard security compliance reports.
External Vulnerability Scan Detail by Issue Report
A more compact version of the External Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.
External Network Vulnerabilities Summary Report
This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of all issues allow a quick survey of the various issues that were detected in an environment.
Outbound Security Report
Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
Security Policy Assessment Report
A detailed overview of the security policies which are in place on both a domain wide and local machine basis. |
Share Permission Report by Computer
Comprehensive lists of all network "shares" by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Share Permission Report by User
Organizes permissions by user, showing all shared computers and files to which they have access.
User Behavior Analysis Report
Shows all logins, successful and failure, by user. Report allows you to find service accounts which are not properly configured (and thus failing to login) as well as users who may be attempting (and possibly succeeding) in accessing resources (computers) which they should not be.
Login History by Computer Report
Same data as User Behavior but inverted to show you by computer. Quite useful, in particular, for looking at a commonly accessed machines (file server, domain controller, etc.) – or a particularly sensitive machine for failed login attempts. An example would be CEO's laptop – or the accounting computer where you want to be extra diligent in checking for users trying to get in.
Login Failures by Computer Report
Report identifies users who have succeeded in logging in to another machine. Great for auditing/logging purposes to know of all attempts.
Data Breach Liability Report
Identifies specific and detailed instances of personal identifiable information (PII) and cardholder data throughout a computer network that could be the target of hackers and malicious insiders. It also calculates the potential monetary liability and exposure based upon industry published research.
RSOP Computer Settings Report
This report analyzes the various Resulting Sets of Policy (RSOP) based on computer policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network. Small variants might be a result of misconfiguration of misapplication of Group Policies at the computer level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.
RSOP User Settings Report
This report analyzes the various Resulting Sets of Policy (RSOP) based on user policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network. Small variants might be a result of misconfiguration of misapplication of Group Policies at the user level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.
Get a Quote
Talk to Us Today
How Can We Help?