Can IT managed services help your business?

The drivers for adopting IT managed services can vary from one business to another. For our small to mid-market clients, their typical drivers have been:

 IT skills gap
 Entrance in to new markets
 New technology adoption
 Business agility

24/7 support
Current service performance
Escalating IT costs
Business growth

How we are different?

We want to help you, but at the same time to be fair to you and to ourselves. We know times are tough now, but we also know that survival of small businesses and sole proprietors is crucial for our economy.

We don’t overcomplicate things
 We don’t overcharge you
 Fixed monthly fee for monitoring and security
 We’re willing to go onsite, no matter where you are*
 We take responsibility for our words and actions

We will listen to you
All services are charged according to predefined rates
We will NOT keep your passwords/information hostage.
NO retainers or upfront costs for support*
NO Contracts! You are free to make your choices

Why Do I Need Managed IT Services?

Put the responsibility of your businesses infrastructure and cloud based services in the hands of our experienced technicians. Outsourcing your technology needs to service provider, like us at RwebZ, gives you the peace of mind to focus on what you need to while we ensure that any technology related disasters gets stopped in its track.

We strategically manage your IT infrastructure by monitoring and maintaining your systems, essentially giving your business its very own dedicated IT department.

What are the benefits of choosing us for your Managed IT Services?

Managed Infrastructure

If it’s in your IT infrastructure stack we can help you manage, maintain, and optimise it. From on-premise servers, storage, and end-user compute through to gateway and security devices.

Managed Cloud

Managed Cloud solutions that are scalable, robust, and redundant. Remove the headache and overhead of ongoing management, security, and compliance that comes with Cloud infrastructure, let us design and deploy a solution for you.

Proactive patching

RWebZ Managed IT Service provides proactive patching and security monitoring on all desktops and servers, so you are protected against newly discovered vulnerabilities as soon as possible.

Hardware Management

Ensuring your computer equipment works well also requires maintaining your hardware. We manage everything from hardware maintenance to sourcing quality equipment as per your needs.

Flexible Solutions

We can create a custom tailored fixed-rate solution that works for your business needs, whether you have a small company or large enterprise. Our Managed Services becomes a huge saving and investment for your company.

Network Management

Cloud based services depend on a network to work. We ensure your network is running efficiently and is consistently monitored

Tactical Technologies

The technology environment is ever changing and as your business adapts, so does your technology needs. With our Managed IT services, we ensure you have not just the best solution, but a solution adapted to help your business run effectively.

24/7 monitoring

Your business competers are being monitored 24/7/365, Our management system will notify us as soon as it detects an issue.

Platforms that we use

A staggering 58 percent of all malware attack victims are categorized as small businesses, according to the Verizon 2018 DBIR. In 2017, more than half of all SMB’s experienced a ransomware attack, and the cost due to damage, theft or disruption caused by cyberattacks exceeded $1,000,000 for the average SMB, according to Ponemon Research.

The Story of Comodo Cybersecurity

In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud.

The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cyber security has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.

Comodo Cybersecurity’s technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file, so it can be handled accordingly by either software or human analysts. This shift from reactive to proactive is what makes Comodo Cybersecurity unique and gives them the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.

This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes an important reality: while you cannot prevent 100% of malware – you can render malware useless.

The software is designed to be secure ‘out of the box’ – so even the most inexperienced users need not have to deal with complex configuration issues after installation.

Introduction to RWebZ Client Security

RWebZ Client Security (RCS) offers complete protection against internal and external threats by combining a powerful antivirus, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called Advanced Protection.

When used individually, each of the Antivirus, Firewall, HIPS, Containment, File Rating, Advanced Protection and Website Filtering modules delivers superior protection against their specific threat challenge. When used together they provide a complete ‘prevention, detection and cure’ security system for your computer. Once installed on a Windows endpoint, RCS can be remotely configured and monitored by us.

RWebZ Endpoint Security Key Features

RWebZ AV A proactive Anti-Virus engine that automatically detects and eliminates viruses, worms and other malware.

RWebZ Containment Comodo’s threat containment provides total protection against zero-day threats while having no impact on end-user experience or workflows. All untrusted processes and applications are automatically contained in a secure environment, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads.

Valkyrie Valkyrie is a cloud-based file verdict service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. RCS on managed Windows computers can automatically submit unknown files to Valkyrie for analysis. The results of these tests produce a trust verdict on the file which can be viewed from the ITSM interface. Detecting, investigating, and mitigating suspicious activities and issues on hosts and endpoints.

RWebZ Firewall Highly configurable packet filtering firewall that constantly defends inbound and outbound internet attacks

Host Intrusion Prevention System (HIPS) Constantly monitors system activity and only allows executables and processes to run if they comply with security rules that have been enforced by the Windows profile applied to the managed computer.

Virus Scope Monitors the activities of processes running at the endpoints and generates alerts if they take actions that could potentially threaten privacy and/or security of the end user. Apart from forming yet another layer of malware detection and prevention, the sub-system represents a valuable addition to the core
process-monitoring functionality of the RCS by introducing the ability to reverse potentially undesirable actions of software without necessarily blocking the software entirely. This feature can provide you with more granular control over otherwise legitimate software which requires certain actions to be implemented to run correctly.

Website Filtering Create website filtering rules which let you determine which sites certain users can or cannot access.

Mobile Device Management For the purposes of this guide, a mobile device is any Android or iOS smart phone or tablet that is allowed to connect to the enterprise network through a wireless connection.
RWebZ IT and Security Manager allows network administrators to remotely configure device access rights, security settings, general preferences and to monitor and manage the device. Mobile devices may be employee or company owned.

RWebZ Client Security RWebZ Client Security (RCS) is the remotely managed endpoint security software installed on managed Windows devices. Each component of RCS can be configured to offer the desired security level by applying configuration profiles.

File Lookup Service (FLS) A cloud-based file lookup service that ascertains the reputation of files checking them against Comodo’s master whitelist and blacklist.

Patch Management The Patch Management module monitors Windows OS updates and patches for 3rd party software. It identifies patches appropriate for the OS version of each managed Windows device and. If required, automatically installs them.

Remote Monitoring and Management The Remote Monitoring and Management (RMM) Module is an efficient endpoint monitoring application that allows administrators to monitor and manage multiple endpoints from one centralized console.

Secure DNS Filtering

Cloud-based solution that blocks malicious websites

Secure DNS Filtering is a cloud-based solution that blocks websites by 83 categories and blocks advanced threats like phishing, malicious domains and endpoints communicating with command and control servers. Secure DNS Filtering can be used for controlling, monitoring and securing the web access of your users by their locations, internal IP addresses,  networks, any type of mobile devices, and devices both on and off the network.

Paired with the largest threat intelligence lab in the market

Our Threat Intelligence Labs monitors, filters and contains, and analyzes malware, ransomware, viruses and other “unknown” potentially dangerous files 24x7x365 in over 190 countries around the world. With 5 offices spread across the Americas, Asia, and Europe (and staff covering over 190 countries), the Lab is made up of more than 120 IT security professionals, ethical hackers, computer scientists and engineers (all full-time Comodo Lab employees) analyzing millions of potential pieces of malware, phishing, spam or other malicious/unwanted files and emails every day. The Lab also works with trusted partners in academia, government and industry to gain additional insights into known and potential threats.

Ready to get started?

We offer 3 plans depending on a level of automation you require, designed to suit a variety of small and medium business needs. Each package include different level of security and automation services.

Business Premium

C$29.99 /endpoint/mo +

All Essential Features
All Standard Features
Ransomware Attack Protection***
Secure Internet Gateway
Asset Management
Quarterly Environment Reviews
Portal Access for Account Manager

* Remote support is an additional service and is charged in increments of 30 minutes.
** Any additional services, like onsite visits, remote repairs, troubleshooting, etc, are charged hourly depending on the service provided. Please contact us to inquire
*** Comodo Endpoint Detection and Response (EDR) is a powerful event analysis tool that provides real-time monitoring and detection of malicious events on Windows endpoints. Endpoint Detection and Response allows you to visualize threats in a detailed timeline while instantaneous alerts keep you informed if an attack occurs.

Need more info?