Crescendo Security As-a-Service packages (SECaaS) are based on Cisco Meraki MX Security Appliance technology – ideal for small and medium-sized organizations, especially for those operating in multiple locations.
The SECaaS packages have many features, eliminating the need to use multiple hardware equipment in one location.
You will benefit from the latest security technologies, paying only a monthly subscription
Use OPEX, without requiring any initial investment
Set up a meeting with one of CRESCENDO security experts to see how we can get the benefits of SECaaS in your business.
Threat definitions and filter lists are automatically updated to protect your company from the latest vulnerabilities or unfriendly websites.
Our cloud-based solution has the advantage of securing a location within your organization in minutes.
The solution offers increased redundancy thanks to support for two uplink connections, including 3G / 4G mobile networks.
Automatically assign firewall rules and traffic shaping, bandwidth restrictions to enforce policies for the rights of each user or group of users.
Protects critical network resources against the latest security threats and vulnerabilities.
Automatically secures organization locations using mesh or hub-and-spoke technology.
Block unwanted web content through over 70 categories and put forward cloud verification, filtering billions of URLs.
It protects your network against malware and identifies infected files that were previously unknown through retrospective detection.
Provides service integrity through multiple uplink connections and VPN that reconnects automatically.
Identifies the applications that are used and then prioritizes critical applications while limiting recreational applications.
From the same management console, you can also operate the wireless solution.
Basic | Premium | Premium Plus | |
---|---|---|---|
Monitoring and Reporting | |||
Technical support | |||
Automatic device update | |||
Configure your device without your presence at your location | |||
Firewall state-full | |||
Policies based on user identity | |||
Automated automated VPN (IPSec) for site-to-site, hub-and-spoke or mesh topologies | |||
Automatic switch on 3G / 4G mobile network | |||
Content filtering | |||
Intrusion Prevention Sensor (IPS) | |||
Anti-virus | |||
Anti-phishing | |||
Geo-based firewall rules | |||
Advanced consulting services |