MALWAREBYTES ENDPOINT PROTECTION & RESPONSE THE MUST-HAVE ANTI-EVERYTHING PROTECTION THAT OUTPERFORMS EVERYONE

CJIS Solutions provides antivirus, internet filtering, anti-spam, and anti-spyware that meets and exceeds the requirements in section 5.10.4.3 of the CJIS Security Policy.

Everyone knows that every computer needs a good antivirus. Everyone also knows that ransomware encrypting your files will land your agency in the news just like any other incident your agency has to endure.  But what if you had a product that could nearly eliminate the potential for that bad exposure?  Or even better, the need to restore your entire network from one officer clicking a bad link or opening the wrong file?
Well now you can.  Malwarebytes with Endpoint Protection and Incident Response not only cleans your computer like the old versions were so popular for, but also prevents real time virus, ransom, malware, spyware, everything-ware attacks.  The new version also isolates your environment during an attack even more, allows you to ROLL BACK ENCRYPTED FILES up to 72 hours to a pre-encrypted state!  How’s that for dodging a bad news article and liability!

Look, if you searched online how to clear any virus or malware, the first thing any article, blog, website, post, or support person writes is “Download Malwarebytes and run a scan”.  So why not just protect yourself BEFORE the infection by using that same very product?

STILL NOT CONVINCED?

Look for yourself.  This link will show you in real-time every device around the world that has an antivirus product in it that also downloaded Malwarebytes.  As you watch, you’ll see how Malwarebytes is being used to find infections that the “other guys” never found.  Like we always say, why buy a product that “compares itself” to the best when you can just HAVE the best?

DOES THE “OTHER” PRODUCT INCLUDE THIS?

multivector-icon

AUTOMATED REMEDIATION

Malwarebytes Multi-Vector Protection (MVP) uses a seven-layered approach, including both static and dynamic detection techniques, to protect against all stages of an attack.

flight-recorder

FLIGHT RECORDER

Continuous monitoring and visibility into Windows desktops for powerful insights. Easily track file system activity, network activity, process activity, and registry activity.

endpoint-isolation

ENDPOINT ISOLATION

Fast remediation prevents lateral movement. Malware is stopped from phoning home and remote attackers are locked-out. Safely keeps the system online for detailed analysis.

rollback

RANSOMWARE ROLLBACK

Every change made by a process is recorded. If a process does ‘bad’ things you can easily roll back those changes to restore files that were encrypted, deleted, or modified.

HOW WE MEET CJIS COMPLIANCE

CJIS Solutions meets CJIS Compliance in every area

Here are a few key areas most asked about:


  • CONTRACTS

    CJIS Solutions offers a binding corporate contract between CJIS Solutions and the agency or vendor. They commit CJIS Solutions to the business relationship, CJIS Security Policy, and IACP Guiding Principles on Cloud Computing.
  • CJIS SECURITY ADDENDUM “SECTION H”

    The Client agency or vendor will receive CJIS Security Addendums for CJIS Solutions and it’s staff.
  • ACCESSIBILITY

    Ever wonder where your data is? Well not any more! As required by the CJIS Policy, you ALWAYS have access to your data, logically AND Physically. There’s no secret as to where it’s housed, simply let us know and we’ll walk you right up to your environment.
  • FINGERPRINTS AND BACKGROUND CHECKS

    Every member of CJIS Solutions who has physical and/or logical access to client data has been Fingerprinted and background checked. Copies of fingerprints are available upon request to client agencies.
  • TRAINING

    The CJIS Security Policy requires training every 2 years however because of the frequency of changes, CJIS Solutions staff conducts CJIS Training annually.
  • ENCRYPTION

    Everything in the CJIS Solutions cloud is encrypted with FIPS 140-2 standards. This includes, but not limited to: cloud compute, cloud storage, backup fabrics, VPN and connectivity when required.
  • LATEST FIRMWARE, PATCHES, EQUIPMENT

    CJIS Solutions uses only the latest patches, firmware, operating systems, and technologies to ensure that vulnerabilities are addressed immediately. This includes, but not limited to: cutting edge hardware, intrusion prevention, virtualization technology, firewalls, storage, servers, and so on.
  • SECURE ACCESS

    ALL CJIS Solutions Staff accesses the cloud environment with a 2 Factor Authenticated FIPS 140-2 VPN tunnel.
  • AUDIT LOGGING

    All access to CJIS Solutions’ areas (Non-client owned) by staff and clients is logged and kept for 2 years, a full year longer than the policy requires.
  • SECURE DATA CENTERS

    Hardened, Certified Tier 3 Uptime facilities that exceed SSAE 16 standards. Throw in CJIS Solutions custom physical and logical security measures and our restricted access is unsurpassed.

PLEASE NOTE: For security purposes we do not generally disseminate our client list or products used. For more information, please inquire below and we can provide references upon request.