Here are some additional details about the solutions in the Compliance Plan. Entre’s Compliance Plan aligns with the controls in CIS v8 and establishes a framework of robust security measures, helping to protect your network from cyberattacks. This plan is designed to meet the minimum requirements for cyber liability insurance policies. These include data about our current software being utilized right now but are subject to change in the future as new products and technologies come out.
CLICK HERE for a full overview of our Compliance Policies
Compliance Plan Features
Advanced Endpoint Security with 365 Days of Log Retention
We utilize a product from Sophos called Intercept X, which includes Endpoint Detection and Response (EDR) to automatically detect and prioritize potential threats, quickly see where to focus attention, and know which machines may be 1 impacted. This service includes 365 days of log retention in the Sophos Datalake. It includes Managed Threat Response, which provides 24×7 SOC support from Sophos’ Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats.
Sophos Endpoint powered by Intercept X
MFA to the Desktop for Remote Administration
In today’s rapidly evolving digital landscape, the security of remote administration is more critical than ever. That’s why Entre relies on Evo Security’s advanced Identity and Access Management (IAM) solution to ensure the highest level of protection. Implementing Multi-Factor Authentication (MFA) is a cornerstone of our security strategy, providing an essential defense against unauthorized access. MFA from Evo Security demands multiple verification forms before granting access, significantly reducing the risk of cyber threats and ensuring compliance with cyber- liability insurance coverage and many other compliance regulations.
Evo End User Elevation | Evo Security
Internal and External Vulnerability Scanning
In an era where cyber threats constantly evolve, proactive defense is key to maintaining robust digital security. Entre leverages the sophisticated vulnerability scanning solution from Connect Secure to identify and mitigate potential security weaknesses before they can be exploited. Connect Secure’s comprehensive scanning technology delves deep into your network, uncovering vulnerabilities that could open your system to cyber-attacks. This preemptive approach ensures that your infrastructure remains fortified against emerging threats, maintaining the integrity and confidentiality of your data.
Platform | ConnectSecure