The drivers for adopting IT managed services can vary from one business to another. For our small to mid-market clients, their typical drivers have been:
IT skills gap
Entrance in to new markets
New technology adoption
Current service performance
Escalating IT costs
We want to help you, but at the same time to be fair to you and to ourselves. We know times are tough now, but we also know that survival of small businesses and sole proprietors is crucial for our economy.
We don’t overcomplicate things
We don’t overcharge you
Fixed monthly fee for monitoring and security
We’re willing to go onsite, no matter where you are*
We take responsibility for our words and actions
We will listen to you
All services are charged according to predefined rates
We will NOT keep your passwords/information hostage.
NO retainers or upfront costs for support*
NO Contracts! You are free to make your choices
Put the responsibility of your businesses infrastructure and cloud based services in the hands of our experienced technicians. Outsourcing your technology needs to service provider, like us at RwebZ, gives you the peace of mind to focus on what you need to while we ensure that any technology related disasters gets stopped in its track.
We strategically manage your IT infrastructure by monitoring and maintaining your systems, essentially giving your business its very own dedicated IT department.
A staggering 58 percent of all malware attack victims are categorized as small businesses, according to the Verizon 2018 DBIR. In 2017, more than half of all SMB’s experienced a ransomware attack, and the cost due to damage, theft or disruption caused by cyberattacks exceeded $1,000,000 for the average SMB, according to Ponemon Research.
In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud.
The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cyber security has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.
Comodo Cybersecurity’s technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file, so it can be handled accordingly by either software or human analysts. This shift from reactive to proactive is what makes Comodo Cybersecurity unique and gives them the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.
This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes an important reality: while you cannot prevent 100% of malware – you can render malware useless.
RWebZ Client Security (RCS) offers complete protection against internal and external threats by combining a powerful antivirus, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called Advanced Protection.
When used individually, each of the Antivirus, Firewall, HIPS, Containment, File Rating, Advanced Protection and Website Filtering modules delivers superior protection against their specific threat challenge. When used together they provide a complete ‘prevention, detection and cure’ security system for your computer. Once installed on a Windows endpoint, RCS can be remotely configured and monitored by us.
RWebZ AV A proactive Anti-Virus engine that automatically detects and eliminates viruses, worms and other malware.
RWebZ Containment Comodo’s threat containment provides total protection against zero-day threats while having no impact on end-user experience or workflows. All untrusted processes and applications are automatically contained in a secure environment, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads.
Valkyrie Valkyrie is a cloud-based file verdict service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. RCS on managed Windows computers can automatically submit unknown files to Valkyrie for analysis. The results of these tests produce a trust verdict on the file which can be viewed from the ITSM interface. Detecting, investigating, and mitigating suspicious activities and issues on hosts and endpoints.
RWebZ Firewall Highly configurable packet filtering firewall that constantly defends inbound and outbound internet attacks
Host Intrusion Prevention System (HIPS) Constantly monitors system activity and only allows executables and processes to run if they comply with security rules that have been enforced by the Windows profile applied to the managed computer.
Virus Scope Monitors the activities of processes running at the endpoints and generates alerts if they take actions that could potentially threaten privacy and/or security of the end user. Apart from forming yet another layer of malware detection and prevention, the sub-system represents a valuable addition to the core
process-monitoring functionality of the RCS by introducing the ability to reverse potentially undesirable actions of software without necessarily blocking the software entirely. This feature can provide you with more granular control over otherwise legitimate software which requires certain actions to be implemented to run correctly.
Website Filtering Create website filtering rules which let you determine which sites certain users can or cannot access.
Mobile Device Management For the purposes of this guide, a mobile device is any Android or iOS smart phone or tablet that is allowed to connect to the enterprise network through a wireless connection.
RWebZ IT and Security Manager allows network administrators to remotely configure device access rights, security settings, general preferences and to monitor and manage the device. Mobile devices may be employee or company owned.
RWebZ Client Security RWebZ Client Security (RCS) is the remotely managed endpoint security software installed on managed Windows devices. Each component of RCS can be configured to offer the desired security level by applying configuration profiles.
File Lookup Service (FLS) A cloud-based file lookup service that ascertains the reputation of files checking them against Comodo’s master whitelist and blacklist.
Patch Management The Patch Management module monitors Windows OS updates and patches for 3rd party software. It identifies patches appropriate for the OS version of each managed Windows device and. If required, automatically installs them.
Remote Monitoring and Management The Remote Monitoring and Management (RMM) Module is an efficient endpoint monitoring application that allows administrators to monitor and manage multiple endpoints from one centralized console.
Secure DNS Filtering is a cloud-based solution that blocks websites by 83 categories and blocks advanced threats like phishing, malicious domains and endpoints communicating with command and control servers. Secure DNS Filtering can be used for controlling, monitoring and securing the web access of your users by their locations, internal IP addresses, networks, any type of mobile devices, and devices both on and off the network.
Our Threat Intelligence Labs monitors, filters and contains, and analyzes malware, ransomware, viruses and other “unknown” potentially dangerous files 24x7x365 in over 190 countries around the world. With 5 offices spread across the Americas, Asia, and Europe (and staff covering over 190 countries), the Lab is made up of more than 120 IT security professionals, ethical hackers, computer scientists and engineers (all full-time Comodo Lab employees) analyzing millions of potential pieces of malware, phishing, spam or other malicious/unwanted files and emails every day. The Lab also works with trusted partners in academia, government and industry to gain additional insights into known and potential threats.
24/7 Performance Monitoring
24/7 Availability Monitoring
24/7 Proactive Health Monitoring
24/7 Mobile device monitoring
24/7 Server monitoring
24/7 Workstation monitoring
Daily security patching
Weekly critical patching
Removal of unnecessary applications
Easy Ticket Submitting
Mobile Device Management
All Essential Features
Host Intrusion Prevention System
All Essential Features
All Standard Features
Ransomware Attack Protection***
Secure Internet Gateway
Quarterly Environment Reviews
Portal Access for Account Manager
* Remote support is an additional service and is charged in increments of 30 minutes.
** Any additional services, like onsite visits, remote repairs, troubleshooting, etc, are charged hourly depending on the service provided. Please contact us to inquire
*** Comodo Endpoint Detection and Response (EDR) is a powerful event analysis tool that provides real-time monitoring and detection of malicious events on Windows endpoints. Endpoint Detection and Response allows you to visualize threats in a detailed timeline while instantaneous alerts keep you informed if an attack occurs.