Enterprise Services
CRAG is an integration partner for SentinelOne, Qualys, Avanan, and Hook Security. If you are looking to deploy these tools, we assist with licensing, implementation, and training your IT staff.
SentinelOne:
Gartner® Magic Quadrant™ Security
Why we chose SentinelOne
We started using S1 in 2020, and we've been impressed ever since
-
Consistently wins top awards for quality
-
Rapidly adopts new capabilities; rapidly growing AI models
-
Modular and growing Singularity Platform deployed through a single light-ish agent
-
S1 hires employees who are careful with the "Deploy Update" button
Data and AI
A conversational user interface for your SecOps team
Hyperautomate your SOC with an AI model trained on your security data
Consolidate your security data into a single, long-term storage lake
Singularity Data Lake for Log Analytics
Aggregate, store, and analyze log data from across your environment
Endpoint Security
Real-time detection and response of known and behavioral threats
Correlate data across endpoints, cloud, identity for unified threat detection
Singularity RemoteOps Forensics
Automate digital forensic evidence collection for incident response
Singularity Threat Intelligence
Global network of threat data for real-time, actionable insights
Singularity Vulnerability Management
Discover, prioritize, and mitigate the most critical risks
Cloud Security
Security for servers, VMs, containers, and serverless functions
Singularity Cloud Native Security
Security for containers, Kubernetes, and microservices
Singularity Cloud Workload Security
Secure workloads running in public, private, or hybrid cloud environments
Singularity Cloud Data Security
Protect data in cloud object storage solutions
Qualys: compliance and vulnerability management
Why we chose Qualys
Its ability to automate security processes, simplify compliance, and assign a dollar value to risk
-
Single platform for vulnerability management and compliance
-
Automated vulnerability, patch, and compliance management
-
Subscription model offers predictable budgeting
TruRisk Eliminate (TE)
Vulnerability remediation strategies when patching isn't viable
Patch Management (PM)
Automate and accelerate patch management
TruRisk Mitigate (TM)
Mitigate risks when traditional patching isn't immediately feasible
Custom Assessment and Remediation (CAR)
Build or borrow custom scripts for assessment and remediation
Policy Compliance
Assess, automate, and manage compliance
File Integrity Monitoring (FIM)
Track changes to critical system files, configurations, and content
CyberSecurity Asset Management (CSAM)
Enhance visibility, control, and security of IT assets
External Attack Surface Management (EASM)
Visibility and security for assets that are exposed to the internet
Enterprise TruRisk Management (ETM)
Unified view of cybersecurity risk across the entire enterprise
TotalAI
Secure your generative AI (GenAI) and large language models (LLMs)
Vulnerability Management, Detection & Response (VMDR)
Unified vulnerability management, threat detection, and response
Web App Scanning (WAS)
Discover, assess, and secure web applications and APIs
API Security
Identify vulnerabilities, misconfigurations, and potential threats in both REST and GraphQL APIs
Avanan: Email, Collaboration, and Accounts
Why we chose Avanan
Better filtering, more features, and less tech time than competing products
-
22% fewer false positives/negatives than our previous solution, based on internal data
-
Account takeover protection included in the mid-tier product at a great price point
-
31% reduction in tech time spent reviewing flagged emails, based on internal data
Account Takeover Protection
Detecting risks from compromised accounts using behavioral analysis
User Behavior Analytics
Monitoring user activities to identify anomalies (e.g. impossible travel)
Unified Quarantine
Administer quarantined emails across platforms
Incident Response-as-a-Service (IRaaS)
Reducing burden on internal IT teams
ThreatCloud AI
Global threat intelligence for enhanced security effectiveness
Service Status Reporting
Real-time updates on system health and performance
Multi-Tenancy
Manage multiple departments under a single interface for large orgs
Phishing Protection
Advanced AI detection of phishing attempts
Malware Protection
Pre-delivery scanning and detonation of attachments and links
Ransomware Defense
Pre-delivery link & sender anomaly analysis for unknown threats
Spam Filtering
Intelligent spam blocking through machine learning
One-Click Deployment
Uses Azure integration without the need for MX redirect
Pre and Post-Delivery Protection
Pre-delivery filtering with available post-delivery removal
AI & Machine Learning
Continuously adaptive threat prevention
Teams & Slack Security
Real-time protection against threats in common messaging apps
Cloud Storage Security
Monitoring files stored or shared through OneDrive, SharePoint, Box, ++
Data Loss Prevention (DLP)
Preventing unauthorized sharing of information across cloud platforms
Compliance
Supporting compliance with data policies and controls
Hook Security: Security Awareness Training (SAT)
Why we chose Hook Security
SAT is usually boooring, and Hook makes it fun and engaging
-
Short, fun videos that get to the point
-
Easy deployment through Azure integration
-
Phishing simulation and remedial training
-
SCORM compliant integration for HR's LMS
-
In-depth reports to identify at-risk employees
-
Compliance tracking and demonstration capabilities
-
Real-time insights and actionable data
-
Integration with various Learning Management Systems (LMS) through SCORM compliance
-
Email client plugins (like Hookmail for Microsoft and Google) for in-inbox training and reporting
-
User management features allowing for easy enrollment and tracking of training progress
-
Annual training modules for employee education
-
Monthly deep dives into security topics
-
Variety of training content tailored to different learning styles and needs
-
Automated phishing simulations
-
Instant training feedback for those who click on phishing emails
-
Micro-learning modules to educate users on the spot
Acronis Cyber Protect Backup:
Resilient Backup for Enterprise
Why we chose Acronis
We started using Acronis in 2021, and its reliability is impressive
-
Offers the fastest RTOs, as low as 15 seconds
-
Provides a user-friendly, centralized management console for all platforms
-
Scales seamlessly to protect any workload without performance issues
-
Comprehensive protection with hybrid on-prem and cloud options
Centralized Management Console
Single pane to manage backup tasks, policies, and recovery operations
Bare-Metal Restoration
Restore an entire system with minimal downtime
Granular Recovery
Recover individual files, folders, or app items from a backup image
Multi-Destination Backup
Send to on-prem and cloud for the 3-2-1 backup rule
Geo-Redundant Storage
Backups automatically replicate to remote data centers
Continuous Data Protection
Real-time backups of changes made to data, near-zero RPOs
Scalable Storage Options
Flexible cloud storage plans that scale according to your needs
Immutable Backups
Cannot be altered or deleted by ransomware or malicious actors
Automatic Protection for MS 365
Backups managed directly from the cloud through enterprise app
Granular Recovery
Restore individual from SharePoint, OneDrive, or Exchange
Point-in-Time Recovery
Undo accidental deletions or changes
Unlimited Cloud Storage
Back up without worrying about storage limitations