{"id":710,"date":"2020-05-25T08:52:22","date_gmt":"2020-05-25T08:52:22","guid":{"rendered":"https:\/\/tsisupport.com\/?page_id=710"},"modified":"2023-03-30T18:54:00","modified_gmt":"2023-03-30T22:54:00","slug":"cyber-security-services","status":"publish","type":"page","link":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710","title":{"rendered":"Cyber Security Services"},"content":{"rendered":"\n<h1>\n\t\tTSI&#8217;s Managed Cybersecurity Services &#038; Solutions\n\t<\/h1>\n<h2>\n\t\tC\n\t\tybersecurity Services\n\t\t\t\t<\/h2>\t\n<h6>\n\t\tProtecting Your Network Infrastructure from Outside and Inside Threats\n\t<\/h6>\n\t<p>With the increase in cybercrime, neglecting to establish a strong security strategy can easily cripple your business or ruin a hard-earned reputation overnight. Our Security Experts identify network vulnerabilities to implement measures that can prevent them from compromising vital technology assets and data. Our comprehensive suite of security services includes AntiVirus\/AntiMalware as well as Phishing, Penetration Testing, and Network Monitoring, ensuring your technology investments are secured, protected, and verifiable.<\/p>\n\t\t\t<a href=\"#Managed_Services_Plans\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tManaged IT Security Services Plans\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecA\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tNetwork Monitoring\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecB\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tNetwork Security\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecC\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tVM Scanning\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecD\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tAntiVirus &#038; AntiMalware\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecE\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tRansomware Preparation\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecF\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tPenetration Testing\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecG\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tFirewall Management\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecH\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tNetwork Security Assessments\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#NS_SecI\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tEnd User Awareness Training\n\t\t\t\t\t<\/a>\n\t\t\t<a href=\"#ZTNA\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tZero Trust Architecture (ZTNA)\n\t\t\t\t\t<\/a>\n<h2>\n\t\tC\n\t\tybersecurity Services Provider (MSSP)\n\t\t\t\t<\/h2>\t\n<h6>\n\t\tIT Security &#038; Protection for Your Business\n\t<\/h6>\n\t<p>TSI&#8217;s Managed IT Security Services plans minimize the impact of today&#8217;s most common IT security threats so you can peacefully focus on growing your business. Addressing IT security is an ongoing, holistic process that includes the regular and rigorous testing of your IT systems, the reporting required verifying your IT security posture and the tools to enforce best practices.<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png\" alt=\"i-report-icon\" itemprop=\"image\" height=\"66\" width=\"64\" title=\"i-report-icon\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tI-DEFEND\n\t<\/h2>\n\t<p>The foundation to our security service model, I-Defend includes Anti-Virus, Anti-Malware, 3rd Party Patching, System Updates &amp; Patching, Phishing &amp; Vishing Simulation Training, Monthly Performance Reporting, and much much more.<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-protect-icon.png\" alt=\"i-protect-icon\" itemprop=\"image\" height=\"63\" width=\"63\" title=\"i-protect-icon\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tI-PROTECT\n\t<\/h2>\n\t<p>A robust and comprehensive set of security services are part of our I-Protect offering. Some of the benefits include Mobile Device Management, Network Log Monitoring, and Security Documentation Generation for a audit trail of user activities conducted on your network.<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-guarg-icon.png\" alt=\"i-guarg-icon\" itemprop=\"image\" height=\"61\" width=\"69\" title=\"i-guarg-icon\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tI-GUARD\n\t<\/h2>\n\t<p>Our most inclusive Security Service offering, I-Guard goes beyond the other services to provide Incident Response Planning &amp; Documentation Generation, Strategic Review of Regulatory Compliance, as well as External Penetration Testing.<\/p>\n\t\t\t\t<table>\n\t\t\t\t\t<thead>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th rowspan=\"\" colspan=\"4\">\n\t\t\t\t\t\t\t\t\t\t Managed IT Security Services \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/th> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th rowspan=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t Service \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/th> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th rowspan=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t I-Defend \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/th> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th rowspan=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t I-Protect \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/th> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th rowspan=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t I-Guard \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/th> \n\t\t\t\t\t\t\t\t\t\t\t<\/tr><\/thead>\n\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Managed Anti-Virus &#038; Anti-Malware \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t AD &#038; File Access Monitoring \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t End User Security Awareness Training \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Internal Vulnerability Management Scanning \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t External Vulnerability Management Scanning \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t 3rd Party Patching \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Systems Updates &#038; Patching \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Quarterly Firewall Change Logging \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Phishing &#038; Vishing Simulation Training \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Removable Media Susceptibility Training \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Monthly Reporting \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Annual Security Assessment \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Mobile Device Management \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Ongoing &#038; Quarterly Strategic Review \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Security Documentation Generation \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Network Security Log Monitoring and Alerting (SIEM) \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Incidence Response Planning &#038; Documentation Generation \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Regulatory Compliance Strategic Review \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t External Penetration Testing \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr><tr> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t Internal Penetration Testing \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\"> \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t<\/tr><\/tbody>\n\t\t\t\t<\/table>\n<h2>\n\t\tN\n\t\tetwork Monitoring\n\t\t\t\t<\/h2>\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/08\/network-monitoring-img-new-a.png\" alt=\"network-monitoring-img-new-a\" itemprop=\"image\" height=\"340\" width=\"396\" title=\"network-monitoring-img-new-a\" onerror=\"this.style.display='none'\"  \/>\n\t<p>If your organization is dependent on the optimal performance of your infrastructure, then the ability to monitor your network architecture&#8217;s performance is of the utmost importance. Network monitoring provides clients will 24x7x365 monitoring of their network&#8217;s most mission critical areas including routers, switches, firewalls, and servers, to ensure their optimal performance alongside the ability to proactively address issues before lagging systems or downtime impact users. Proactively identifying network performance bottlenecks help make the most of your IT investments and minimize costly end user non-productivity.<\/p>\n<h2>\n\t\tN\n\t\tetwork Security Monitoring &#038; Alerting (SIEM)\n\t\t\t\t<\/h2>\t\n\t<p>For organizations that require a real-time, comprehensive pulse on the current security posture, they leverage TSI&#8217;s Network Security Monitoring &amp; Alerting (SIEM) solution. Clients using this solution are provided real time reporting of what is occurring throughout their networks, who has access to their sensitive data and includes the reporting capabilities to track those activities or events. This service includes managed detection and response, and crisis support, log collection and retention that addresses the majority of today&#8217;s common compliance (CMMC, PCI, HIPAA) requirements for a predictable, cost effective price. \u00a0<a href=\"https:\/\/tsisupport.com\/tsistaging\/partners\/arctic-wolf\/\" target=\"_blank\" rel=\"noopener\">Click here to learn more!<\/a><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/08\/network-security-monitoring-alerting-siem-img-new.png\" alt=\"network-security-monitoring-alerting-siem-img-new\" itemprop=\"image\" height=\"342\" width=\"307\" title=\"network-security-monitoring-alerting-siem-img-new\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tV\n\t\tulnerability Management (VM) Scanning\n\t\t\t\t<\/h2>\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/08\/vulnerability-management-vm-scanning-img-new.png\" alt=\"vulnerability-management-vm-scanning-img-new\" itemprop=\"image\" height=\"340\" width=\"564\" title=\"vulnerability-management-vm-scanning-img-new\" onerror=\"this.style.display='none'\"  \/>\n\t<p>TSI&#8217;s Vulnerability Management (VM) Scanning Service is an extension to the TSI Information Security Program and is intended to audit, identify and remediate technical security weaknesses of your firewalls, networks and computers. The scans allow systems to be properly updated, patched, and systems containing protected data, properly configured to leverage access and control against security intrusions. The complete TSI VM scanning program includes;<\/p>\n<ul>\n<li>Educating your staff on the risks of vulnerabilities and the benefits of a well-planned vulnerability management program.<\/li>\n<li>Deploying specialized tools to detect vulnerabilities on the perimeter of your network (WAN) and on computers and devices in the inside of your network (LAN).<\/li>\n<li>Reviewing, reporting and addressing all vulnerabilities that may affect your business operations<\/li>\n<\/ul>\n<h2>\n\t\tA\n\t\tntiVirus &#038; AntiMalware\n\t\t\t\t<\/h2>\t\n\t<p>TSI&#8217;s anti-virus\/malware solution provides the advanced features required to address today&#8217;s most common cyber threats and the verification of controls demanded from most regulatory agencies (CMMC, PCI, GDPR). Not only does this product safeguard against common cyber-attacks, and unlike any other solution on the market, it also includes Ransomware detection, detailed threat analysis, real-time security health scores, data loss prevention, download reputation, and application controls. These powerful features enable administrators to efficiently and proactively mitigate or altogether eliminate the threat of cyber attacks, ensuring the continuity of your business operations and data integrity.\u200b <a href=\"https:\/\/tsisupport.com\/tsistaging\/partners\/sophos\/\" target=\"_blank\" rel=\"noopener\">Click here to learn more!<\/a><\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/antivirus-antiMalware-img.jpg\" alt=\"antivirus-antiMalware-img\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"antivirus-antiMalware-img\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tR\n\t\tansomware Preparation &#038; Remediation\n\t\t\t\t<\/h2>\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/ransomware-preparation-remediatioan-img.jpg\" alt=\"ransomware-preparation-remediatioan-img\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"ransomware-preparation-remediatioan-img\" onerror=\"this.style.display='none'\"  \/>\n\t<p>Cryptolocker, Reveton, JohnnyCrypt&#8230; these are a few of the many names for &#8216;Ransomware&#8217; which have extorted millions of dollars from businesses worldwide. Unfortunately, not much can be done to eradicate these cyber extortionists but our proven methodology does. Combined with end user education and our advanced suite of security tools, we&#8217;re able to safeguard our clients&#8217; assets and remediate the effects of cyber extortion<\/p>\n<h2>\n\t\tP\n\t\tenetration Testing\n\t\t\t\t<\/h2>\t\n\t<p>Organizations often need penetration testing for a number of different reasons. Sometimes it&#8217;s a compliance requirement &#8211; or to ensure that their security posture is as strong as they believe it to be. \u00a0Both the higher levels of CMMC and PCI compliance require it, whereas other times it can also be a vendor-driven requirement- which is equally valid. But more often than not, bad IT marketing makes you think you NEED it when you really don&#8217;t- not yet at least. \u00a0<a href=\"https:\/\/tsisupport.com\/tsistaging\/why-you-dont-really-need-penetration-testing-at-least-not-yet\/\" target=\"_blank\" rel=\"noopener\">Click here to learn more about how we prepare clients for penetration testing<\/a> when the time is right!<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/penetration-testing-img.jpg\" alt=\"penetration-testing-img\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"penetration-testing-img\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tF\n\t\tirewall Management\n\t\t\t\t<\/h2>\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/enable-end-users-to-focus-on-core-competencies-img.jpg\" alt=\"enable-end-users-to-focus-on-core-competencies-img\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"enable-end-users-to-focus-on-core-competencies-img\" onerror=\"this.style.display='none'\"  \/>\n\t<p>As your network&#8217;s first line of defense, it is important to ensure your firewall is proactively managed and that you have the tool set available to optimize its functionality. By combining TSI&#8217;s reporting and management tools with today&#8217;s variety of firewall hardware, we&#8217;re able to provide the 24\/7 support, management, and the remediation needed to safeguard your most precious technology investments. We can quickly generate compliance reports, proactively troubleshoot problems, and provide ease of mind. Any and all issues pertaining to the firewall hardware or it&#8217;s functionality are managed and remediated by TSI including its replacement at End of Life.<\/p>\n<h2>\n\t\tN\n\t\tetwork Security Assessments\n\t\t\t\t<\/h2>\t\n\t<p>TSI provides comprehensive network security assessments that can be used as a means to ensure that network infrastructure is secure from outside intrusion and aligned with industry best practices or your respective compliance requirements (CMMC, PCI, HIPAA, GDPR etc.) Our report and recommendations identify the security gaps within your strategy and include a strategic roadmap outlining the required resources to improve your security or compliance posture.<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/network-security-assessments-img.jpg\" alt=\"network-security-assessments-img\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"network-security-assessments-img\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tE\n\t\tnd User Awareness Training\n\t\t\t\t<\/h2>\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/08\/end-user-security-awareness-training.jpg\" alt=\"end-user-security-awareness-training\" itemprop=\"image\" height=\"344\" width=\"521\" title=\"end-user-security-awareness-training\" onerror=\"this.style.display='none'\"  \/>\n\t<p>To effectively fight the onslaught of cybercrime, you need an educated workforce.\u00a0 Social Engineering Defense is not a course taught in most Universities, it is up to you to cultivate a workplace culture that understands it is everyone&#8217;s responsibility to protect the data your business holds dear.<\/p>\n<p>TSI partners with industry leaders to provide unmatched phishing campaign development, as well as thorough training resources to educate our clients&#8217; workforce.\u00a0 Want to learn more? <a href=\"https:\/\/tsisupport.com\/tsistaging\/partners\/knowbe4\/\" target=\"_blank\" rel=\"noopener\">Click Here!<\/a><\/p>\n<h2>\n\t\tZ\n\t\tero Trust Architecture (ZTNA)\n\t\t\t\t<\/h2>\t\n\t<p>In today&#8217;s digital age, it&#8217;s more important than ever to protect your organization&#8217;s network from cyber threats. One way to do this is by implementing a Zero Trust security model (ZTNA), that assumes that all users and devices trying to access your network are potentially compromised, and therefore must be verified and authenticated before being granted access to your critical apps and data.\u00a0 Want to learn more about the benefits of implementing a Zero-Trust solution to your organization&#8217;s cybersecurity strategy?<\/p>\n<p>Visit our ZTNA page\u00a0<a href=\"https:\/\/tsisupport.com\/tsistaging\/zero-trust-measures-ensuring-the-security-of-your-network\/\" target=\"_blank\" rel=\"noopener\">Here<\/a>!<\/p>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/02\/zero-trust-black.png\" alt=\"graphic for zero trust measures black background\" itemprop=\"image\" height=\"960\" width=\"1920\" title=\"zero trust black\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tWhat Our Clients Are Saying\n\t<\/h2>\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/quote-img.png\" alt=\"quote-img\" itemprop=\"image\" height=\"81\" width=\"81\" title=\"quote-img\" onerror=\"this.style.display='none'\"  \/>\n\t<p>&#8220;Our business is almost 100% IT dependent which is why for over 15 years we&#8217;ve leveraged TSI&#8217;s managed services to maximize uptime and minimize downtime. Between the knowledge of their help desk engineers and the insight our account manager provides, we truly feel that TSI is an integral part of our team and contributing factor to our success strategy and continued growth.&#8221;<\/p>\n<p><strong>Biotechnology Firm \/ Mansfield, MA<\/strong><\/p>\n<h2>\n\t\tDiscuss Network Security with TSI\n\t<\/h2>\n\t<p>If you&#8217;re aware of network vulnerabilities and need to implement measures that can prevent them from compromising vital technology assets and data, and you&#8217;re looking for a collaborative partner to help you along the way, then we encourage you to connect with us. Click the button below to get in touch so we can discuss the next steps.<\/p>\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\" target=\"_self\" role=\"button\" rel=\"noopener\">\n\t\t\t\t\t\t\tContact Us\n\t\t\t\t\t<\/a>\n\n","protected":false},"excerpt":{"rendered":"<p>TSI&#8217;s Managed Cybersecurity Services &#038; Solutions C ybersecurity Services Protecting Your Network Infrastructure from Outside and Inside Threats With the increase in cybercrime, neglecting to establish a strong security strategy can easily cripple your business or ruin a hard-earned reputation overnight. Our Security Experts identify network vulnerabilities to implement measures that can prevent them from&hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":622,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Services : Network Security Assessments : TSI<\/title>\n<meta name=\"description\" content=\"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus &amp; malware and proactive ransomware protection.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Services : Network Security Assessments : TSI\" \/>\n<meta property=\"og:description\" content=\"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus &amp; malware and proactive ransomware protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-30T22:54:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710\",\"name\":\"Cybersecurity Services : Network Security Assessments : TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png\",\"datePublished\":\"2020-05-25T08:52:22+00:00\",\"dateModified\":\"2023-03-30T22:54:00+00:00\",\"description\":\"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus & malware and proactive ransomware protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png\",\"width\":64,\"height\":66},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Services : Network Security Assessments : TSI","description":"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus & malware and proactive ransomware protection.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Services : Network Security Assessments : TSI","og_description":"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus & malware and proactive ransomware protection.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710","og_site_name":"TSI Support","article_modified_time":"2023-03-30T22:54:00+00:00","og_image":[{"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710","url":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710","name":"Cybersecurity Services : Network Security Assessments : TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png","datePublished":"2020-05-25T08:52:22+00:00","dateModified":"2023-03-30T22:54:00+00:00","description":"Feel safer by leveraging our cyber security services such as network security assessments, network monitoring, managed anti-virus & malware and proactive ransomware protection.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?page_id=710"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/i-report-icon.png","width":64,"height":66},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?page_id=710#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Services"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/pages\/710"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=710"}],"version-history":[{"count":5,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/pages\/710\/revisions"}],"predecessor-version":[{"id":14678,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/pages\/710\/revisions\/14678"}],"up":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/pages\/622"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}