[vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image=”15518″ background_image_as_pattern=”without_pattern”][vc_column width=”1/2″][vc_raw_html]JTNDYnIlM0UlM0NiciUzRSUzQ2JyJTNFJTNDYnIlM0U=[/vc_raw_html][vc_raw_html]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[/vc_raw_html][/vc_column][vc_column width=”1/2″][vc_raw_html]JTNDYnIlM0UlM0NiciUzRSUzQ2JyJTNF[/vc_raw_html][gravityform id=”1″ title=”false” description=”false” ajax=”false”][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”center” background_image_as_pattern=”without_pattern” padding_top=”25″ padding_bottom=”25″][vc_column]
[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]
The urgency of Information Security:
Small to Medium Business (SMB) is the most actively targeted and exploited business demographic. On average SMB firms that reported a security incident found that the intruder(s) were active on their business information systems for months prior to detection. The majority of SMB’s are protected with little more than a firewall at the network edge. As threats adapt and use different infiltration vectors these “edge-only” protection strategies are no longer effective. To achieve protection with the blended and adaptive threats of today a more holistic approach is needed. One that incorporates next-generation firewalls, internal heuristic traffic analysis, ongoing proactive vulnerability scanning, organization-wide event correlation, and network edge traffic analysis. Connecting and monitoring all of these disparate points of data has previously been out of the reach of SMB’s. Until Now.[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” background_color=”#eeeeee” padding_bottom=”50″][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]
[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_column_text]
Synthesis clients have a great advantage over their peers, their networks are being monitored 24/7 by CIT’s Network Operations Center (NOC).
[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]
[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_column_text]
Synthesis services include randomly scheduled security health checks of your network, several times per month, including internal and external vulnerability scans.
[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]
[/vc_column_text][vc_separator type=”normal”][vc_column_text]Our analysts review reports to detect changes in your company’s security posture, seal up any security holes, and limit access to sensitive data.[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][vc_column width=”1/4″][vc_separator type=”transparent” up=”23″ down=”0″][vc_column_text]
[/vc_column_text][vc_separator type=”normal”][vc_column_text]
Because we’re analyzing your network looking for malicious activity, we don’t rely on signatures to eliminate unknown or targeted threats.
[/vc_column_text][vc_separator type=”transparent” thickness=”14″ down=”0″][vc_empty_space height=”5px”][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”Offered Services” angled_section=”no” text_align=”center” background_image_as_pattern=”without_pattern” padding_bottom=”10″][vc_column][vc_empty_space][vc_column_text]
[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_tabs style=”vertical_left” el_class=”title_left_align”][vc_tab title=”Security Information & Event Management” tab_id=”d74b3a8d-f1d1-1″][vc_single_image image=”15519″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” up=”12″ down=”0″][vc_column_text]If you experience a security event, we spring into action to contain and then remediate the situation.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Security & Compliance Reports” tab_id=”1430739489637-2-6″][vc_single_image image=”15521″ img_size=”full” qode_css_animation=”element_from_right”][vc_separator type=”transparent” thickness=”12″][vc_column_text]We will work with your auditors and deliver any needed reports showing that your systems and security are in compliance.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Log Management & Review” tab_id=”38aca7a5-367d-8″][vc_single_image image=”15522″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” thickness=”12″][vc_column_text]Our professionals collect, parse, normalize, analyze and archive your log data to keep you secure and compliant.[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][vc_tab title=”Zero Day Protection” tab_id=”1430739681724-3-5″][vc_single_image image=”15523″ img_size=”full” alignment=”center” qode_css_animation=”element_from_right”][vc_separator type=”transparent” up=”12″ down=”0″][vc_column_text]
Because we’re analyzing your network looking for malicious activity, we don’t rely on signatures to eliminate unknown or targeted threats.
[/vc_column_text][vc_separator type=”transparent” up=”50″ down=”0″][/vc_tab][/vc_tabs][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”service” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern” background_color=”#eeeeee” padding_top=”76″ padding_bottom=”65″][vc_column width=”5/6″ offset=”vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10 vc_col-sm-offset-1 vc_col-xs-12″][vc_column_text]
[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]
We deliver proactive IT solutions for small and medium businesses through a rigorous process that involves qualified engineers with an average of eleven years of industry experience. We deliver technology solutions in a repeatable framework using open standards that ensure measurable results for clients. As a result, companies are able to protect themselves from risk, are confident that IT will support their business goals and objectives, and realize greater peace of mind knowing that their systems are scalable. We’ve been doing this for over 15 years and to date have more than 200 customers.
What if you could:
[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”grid” anchor=”contact” angled_section=”no” text_align=”center” background_image=”15418″ background_image_as_pattern=”without_pattern” padding_top=”100″ padding_bottom=”125″][vc_column][vc_row_inner row_type=”row” type=”grid” text_align=”left” background_color=”rgba(255,255,255,0.75)” padding_top=”15″ css_animation=””][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]
[/vc_column_text][vc_separator type=”small” position=”center” color=”#005094″ thickness=”4″ width=”61″ up=”15″ down=”15″][vc_column_text]
[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_row_inner row_type=”row” type=”full_width” text_align=”left” background_color=”rgba(255,255,255,0.75)” padding_top=”25″ padding_bottom=”25″ css_animation=””][vc_column_inner width=”1/4″][/vc_column_inner][vc_column_inner width=”1/4″ css=”.vc_custom_1448049158427{padding-left: 15px !important;}”][vc_single_image image=”15401″ img_size=”200×55″ qode_css_animation=”element_from_fade”][vc_separator type=”transparent” thickness=”6″][vc_column_text]
[/vc_column_text][vc_separator type=”transparent” thickness=”3″][vc_column_text]
[/vc_column_text][vc_separator type=”transparent” thickness=”3″][vc_column_text]
[/vc_column_text]
[vc_empty_space height=”5px”][vc_column_text][/vc_column_text][/vc_column_inner][vc_column_inner width=”2/4″][contact-form-7 id=”15529″ html_class=”default” title=”Contact Us – Homepage Footer”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_column_text][/vc_column_text][/vc_column][/vc_row]