CIS Endpoint Security Services (ESS)

CIS Endpoint Security Services (ESS) are available to U.S. State, Local, Tribal, and Territorial (SLTT) government entities, offered in partnership with CrowdStrike. CIS ESS is a solution deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts.

Learn how to get started with CIS Endpoint Security Services (ESS).

GET STARTED

Protection and Response at the Endpoint

CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.

CIS Monitoring and Management

Organizations using CIS ESS benefit from a cybersecurity defense partner through the 24x7x365 CIS Security Operations Center (SOC). The CIS SOC continuously monitors and manages CIS ESS software, analyzing malicious activity and escalating actionable threats to affected SLTT organizations.

How-CIS-ESS-Works

Additionally, any organization protected by CIS ESS can request the assistance of the CIS Cyber Incident Response Team (CIRT) when they experience a cyber incident. CIS CIRT analysts leverage data from the agents on affected systems and conduct incident analysis remotely, acquiring evidence to uncover what happened, determine the root cause, scope the incident, identify attacker tactics, and more.

file download

The CIS Security Operations Center (SOC)

The Key to Growing Your SLTT’s Cyber Maturity 

DOWNLOAD GUIDE

Additional ESS Capabilities

Mobile

ESS Mobile

Gain Visibility into Blind Spots on Mobile Devices in Real Time

  • Glean actionable insights on mobile threats
  • Migrate cyber risk to mobile devices
  • Automated threat protection with privacy-centric design
  • Compatible with Android and iOS

Available as an add-on capability or standalone service

Get Started
Multi-tenancy

ESS Multi-tenancy

Provides a Unified View of All Endpoint Security Activity Among All Managed Organizations

  • Bird’s-eye view of endpoint security across all of your organizations
  • Customize roles, permissions and escalation procedures

Available as an add-on capability

Get Started

 

Spotlight

ESS Spotlight

Real-time Vulnerability Identification and Management of All Endpoints

  • Real-time, ongoing vulnerability insights
  • Hosted in AWS Cloud
  • Protected user account
  • Compatible with Windows, Linux, and macOS systems

Available as an add-on capability

Get Started

 

Pricing

Please contact us for pricing and more information.

Overview

Protection and Response at the Endpoint

CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.

CIS Monitoring and Management

Organizations using CIS ESS benefit from a cybersecurity defense partner through the 24x7x365 CIS Security Operations Center (SOC). The CIS SOC continuously monitors and manages CIS ESS software, analyzing malicious activity and escalating actionable threats to affected SLTT organizations.

How-CIS-ESS-Works

Additionally, any organization protected by CIS ESS can request the assistance of the CIS Cyber Incident Response Team (CIRT) when they experience a cyber incident. CIS CIRT analysts leverage data from the agents on affected systems and conduct incident analysis remotely, acquiring evidence to uncover what happened, determine the root cause, scope the incident, identify attacker tactics, and more.

file download

The CIS Security Operations Center (SOC)

The Key to Growing Your SLTT’s Cyber Maturity 

DOWNLOAD GUIDE

Additional ESS Capabilities

Mobile

ESS Mobile

Gain Visibility into Blind Spots on Mobile Devices in Real Time

  • Glean actionable insights on mobile threats
  • Migrate cyber risk to mobile devices
  • Automated threat protection with privacy-centric design
  • Compatible with Android and iOS

Available as an add-on capability or standalone service

Get Started
Multi-tenancy

ESS Multi-tenancy

Provides a Unified View of All Endpoint Security Activity Among All Managed Organizations

  • Bird’s-eye view of endpoint security across all of your organizations
  • Customize roles, permissions and escalation procedures

Available as an add-on capability

Get Started

 

Spotlight

ESS Spotlight

Real-time Vulnerability Identification and Management of All Endpoints

  • Real-time, ongoing vulnerability insights
  • Hosted in AWS Cloud
  • Protected user account
  • Compatible with Windows, Linux, and macOS systems

Available as an add-on capability

Get Started

 

Pricing

Please contact us for pricing and more information.

Features
Chart showing ESS Capabilities 
CIS Services logo

Improve your cybersecurity posture with CIS Endpoint Security Services (ESS).

GET STARTED


Questions about ESS?

View our FAQ