CIS Endpoint Security Services (ESS)
CIS Endpoint Security Services (ESS) are available to U.S. State, Local, Tribal, and Territorial (SLTT) government entities, offered in partnership with CrowdStrike. CIS ESS is a solution deployed on endpoint devices to identify, detect, respond to, and remediate security incidents and alerts.
Learn how to get started with CIS Endpoint Security Services (ESS).
Protection and Response at the Endpoint
CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.
CIS Monitoring and Management
Organizations using CIS ESS benefit from a cybersecurity defense partner through the 24x7x365 CIS Security Operations Center (SOC). The CIS SOC continuously monitors and manages CIS ESS software, analyzing malicious activity and escalating actionable threats to affected SLTT organizations.
Additionally, any organization protected by CIS ESS can request the assistance of the CIS Cyber Incident Response Team (CIRT) when they experience a cyber incident. CIS CIRT analysts leverage data from the agents on affected systems and conduct incident analysis remotely, acquiring evidence to uncover what happened, determine the root cause, scope the incident, identify attacker tactics, and more.
The CIS Security Operations Center (SOC)
The Key to Growing Your SLTT’s Cyber Maturity
Additional ESS Capabilities
ESS Mobile
Gain Visibility into Blind Spots on Mobile Devices in Real Time
- Glean actionable insights on mobile threats
- Migrate cyber risk to mobile devices
- Automated threat protection with privacy-centric design
- Compatible with Android and iOS
Available as an add-on capability or standalone service
ESS Spotlight
Real-time Vulnerability Identification and Management of All Endpoints
- Real-time, ongoing vulnerability insights
- Hosted in AWS Cloud
- Protected user account
- Compatible with Windows, Linux, and macOS systems
Available as an add-on capability
Pricing
Please contact us for pricing and more information.
Protection and Response at the Endpoint
CIS ESS provides an additional layer of cybersecurity protection by deploying directly on devices like workstations and servers. The service offers device-level protection and response to strengthen an organization’s cybersecurity program, and provides active defense against both known (signature-based) and unknown (behavioral-based) malicious activity. The service can stop an attack in its tracks upon identifying a threat on an endpoint, regardless of the network it is connected to, taking an active role in mitigating and remediating malware affecting an organization’s devices by killing or quarantining files.
CIS Monitoring and Management
Organizations using CIS ESS benefit from a cybersecurity defense partner through the 24x7x365 CIS Security Operations Center (SOC). The CIS SOC continuously monitors and manages CIS ESS software, analyzing malicious activity and escalating actionable threats to affected SLTT organizations.
Additionally, any organization protected by CIS ESS can request the assistance of the CIS Cyber Incident Response Team (CIRT) when they experience a cyber incident. CIS CIRT analysts leverage data from the agents on affected systems and conduct incident analysis remotely, acquiring evidence to uncover what happened, determine the root cause, scope the incident, identify attacker tactics, and more.
The CIS Security Operations Center (SOC)
The Key to Growing Your SLTT’s Cyber Maturity
Additional ESS Capabilities
ESS Mobile
Gain Visibility into Blind Spots on Mobile Devices in Real Time
- Glean actionable insights on mobile threats
- Migrate cyber risk to mobile devices
- Automated threat protection with privacy-centric design
- Compatible with Android and iOS
Available as an add-on capability or standalone service
ESS Spotlight
Real-time Vulnerability Identification and Management of All Endpoints
- Real-time, ongoing vulnerability insights
- Hosted in AWS Cloud
- Protected user account
- Compatible with Windows, Linux, and macOS systems
Available as an add-on capability
Pricing
Please contact us for pricing and more information.