RESOLUTE
A Fully-Managed Cyber Risk Mitigation Service
Regulatory and Ethics Considerations
If your business provides services in the healthcare or legal market segment, this membership can help you achieve a closer alignment with regulatory or ethics requirement or obligations.
HIPAA
Benefits of this membership align with HIPAA’s Administrative Safeguards Requirements
-
Security Management Process
§164.308(a)(1)
-
Protection from malicious software
§164.308(a)(5)(ii)(B)
-
Response & Reporting
§164.308(a)(6)(ii)
American Bar Association
Align your law practice with the updated ABA Ethics & Professional Conduct Rules and Opinions.
​
-
Promote Risk Awareness
ABA Model Rules 1.1 / 1.15 / 1.6
-
Obtain Risk Visibility
ABA Model Rule 1.4
-
Processes & Monitoring
ABA Model Rules 5.1 / 5.3
-
Opinion 477R
Secure Communication, Competence, Confidentiality
-
Opinion 483
Ethical Obligations, Reasonable Measures
Frequently Asked Questions
We already have an IT support vendor. Does this service replace them?
No. Our service is NOT competing with the core services a traditional IT services provider offers. Our RESOLUTE service is in conjunction with IT service providers.
Our focus is on reducing the attack surface of your organization across a multitude of technology stacks and business workflows. We do this by continuously monitoring system behaviors, alerting on vulnerable applications in the environment, detecting and responding to threat in real time, review configurations of cloud environments and more.
​
Furthermore, our RESOLUTE services focuses on procedures and cultural elements as it relates to reducing cyber risk in the organization.
Some of our employees work remotely. Are they protected when using this service?
Yes. Our service is designed to fit a zero-trust security architecture. Meaning, no matter where your computers are, they are monitored and protected 24/7.
​
Our endpoint detection and response (EDR) component is 100% cloud based. Once configured, it protects computers through sophisticated behavioral and machine-learning capabilities. Even when not connected to the Internet.
We don't have a "security guy", can we still use this service?
Absolutely. We created the RESOLUTE service specifically for that reason. Our clients routinely do not have dedicated cyber security staff.
This is a fully managed security service for your organization.
Our security experts monitor your assets 24/7/365 on your behalf and alert you if a threat or concern is detected.
We have no idea how to start a security program. Does this service help us?
Yes. The RESOLUTE platform incorporates educational means to enable a corporate culture that embraces cyber security as a business process.
We will work closely with your organization to develop tailored cyber security workflows and processes that align with your business operational requirements.
​
This way you can go back and focus on growing your business.
culture
COMPONENTs
A focused approach to inform employees of their role in cyber security and how attackers exploit human emotions.
RESOLUTE:staff
consider the human element in security
Provides access to various training modules that enable staff to recognize cyber threats such as email phishing or financial wire fraud.
Promote cybersecurity awareness through ongoing phishing simulations, training and education, and reinforced security policies.
process
COMPONENTS
Documentation of policies, workflows, and play books to turn a reactive actions into a proactive strategy.
RESOLUTE:MAP
IDENTIFY CRITICAL DATA AND SYSTEM ASSETS
Creating an inventory of digital assets used to interact with critical business information and identifying where sensitive data is stored, enables the development of a sound cyber risk mitigation strategy.
infrastructure
COMPONENTS
Enable sophisticated protection of digital assets by deploying cyber threat detection, protection, and remediation capabilities.
RESOLUTE:CLOUD
Managed Detection & Response for your cloud
Managed Detection and Response (MDR) for Microsoft 365 secures your Microsoft 365 users, applications, and Microsoft cloud environment by leveraging a 24/7 Security Operations Center (SOC).
​
In addition, we will review and manage M365 configuration and security controls on your organization’s behalf to reduce attack surface.
regain trust in your DIGITAL ASSETS
To build a sound foundation for a defense against cyber threats, it is necessary to understand the current network, the tactics of attackers, and the maturity level of a cyber risk mitigation program.
Performing proactive and continuous monitoring empowers your organization to determine if existing security efforts are successful. The ongoing 24/7/365 assessments can detect signs that an attacker has been bypassing existing perimeter defenses on endpoints like computers, laptops, servers, or virtual cloud infrastructure.
Having visibility into endpoint risk profiles within minutes gives you the advantage of focused threat containment and risk mitigation efforts.