In over a decade of operating, ETTE has developed a core competency in securing your IT environment. We understand that security and compliance are crucial elements in securing a company success. Our team will help you by first understanding your needs, and then providing a solution that meets those needs at a surprisingly affordable price.
DNS Filter Cisco Umbrella comes in 3 subscription-based packages, designed to meet the security needs of every organizational size and budget. ETTE can configure your Cisco Umbrella system, configuring all the settings for your organizations particular IT environment. Contact ETTE to find out more about we, in conjunction with Cisco Systems, can help you defend against Web-based threats at a price that is surprisingly affordable. Click here for more details on DNS Filtering.
ETTE has partnered with EventTracker to provide SIEMphonic, a managed security service designed for small to medium organizations. SIEMphonic is installed and managed by ETTE, with the alerts and warnings forwarded to EventTracker’s intelligent Security Operations Center (iSOC) to provide enterprise-level security protection. Click here to learn more about Event Tracker.
Organizations seeking to contract for the federal government need a degree of compliance with NIST 800. In particular, NIST Special Publication 800-171, Protecting Controlled Unclassified Information (“CUI”) in Nonfederal Information Systems and Organizations spells out compliance requirements for current and prospective contractors. Click here for details on NIST 800 Compliance.
ETTE uses a rigorous process that addresses the important considerations for installing and managing patches to your organization’s IT systems and applications. Click here to know about our Patch Management program.
ETTE, through its partner company KnowBe4, provides some of the most effective security awareness training available. The online training course is engaging, easy to incorporate into your IT environment, and strongly supported at both the user and technical level. Click here security for our awareness training details.
ETTE is partnered with ID Agent, a dedicated Dark Web monitoring service provider to provide these services for your organization for an affordable price per user per month. Click here for Dark Web monitorig details.
Endpoint protection is an approach to IT security that focuses on the devices (endpoints) that allow access to a network. We can quickly and efficiently install SentinelOne protection which is the right size and configuration for your organization with minimal intrusion on your daily IT operations, all at a surprisingly affordable price. Click here for details on Next Gen Endpoint Protection.
ETTE Managed Firewall, powered by pfSense, a precisely configured open-source system, includes additional features that are not available in commercial closed source solutions. Provided, tuned, and maintained by ETTE, your Managed Firewall and Snort Intrusion Prevention System is one less item your organization needs to worry about budgeting for and worrying about. Our price is surprisingly affordable. Click here for details on Managed Firewall and IDS/IPS.
Two-factor authentication (2FA) refers to a more secure way to access a physical or virtual environment. Within the context of an IT environment, organizations use 2FA or Multi-factor authentication (MFA) as a more secure way for a user to access a system. Click here for two factor authentication details.
Single Sign On (SSO) is an IT environmental configuration that allows an authorized user to access their system, and all applications and data with one log in. It is a simple principle that can be complicated to implement and potentially costly if implemented incorrectly. ETTE can help your organization build a robust SSO solution, either as a standalone element, or as an integrated part of other IT projects. Click here for SSO (single sign on) details.
ETTE, with the cooperation of our client organization, performs a comprehensive, 20-point assessment corresponding to the well-known SANS 20 Critical Security Controls. Click here for technical security assesment details.