MANAGED SOLUTIONS

Protect your people, data and technology


Cloud Security


Cloud services have rapidly changed the way that companies design their IT systems and how they take services to market. They have made it easier and faster to deploy complex technical infrastructure. Whilst cloud service providers make it easier than ever to deploy secure services at scale, there is still a lot you can do to improve the security of your systems in the cloud, whether SaaS, PaaS or IaaS-based. 

Cloud Security Posture Management

Identify critical risks and vulnerabilities buried in your cloud applications and their dependent software libraries including missing security patches and the latest malware. Build an inventory of all cloud resources in AWS, GCP, and Azure to gain complete visibility of your security posture with actionable reports you can use. All without the use of cumbersome agents.

Workload Protection

Whether hosted in a public cloud service, private cloud or on-prem, workloads need flexible, effective protection from attacks that porous perimeter defences can’t prevent. Bastion’s managed cyber solutions provide effective defence for workloads regardless of location by leveraging a range of protective technologies.

Micro Segmentation

Modern networks are both perimeter-less and porous, covering a broad range of locations from on-prem data centres to public clouds.  This makes it difficult to implement effective network segmentation using traditional technologies such as firewalls and VLANs.  The result is that networks have become vulnerable to lateral movement from attackers and insiders. 

Bastion’s micro segmentation solution allows you to create an effective segmentation policy that prevents lateral movement and limits the exposure of individual services and workloads. 

Microsoft Defender Suite

Microsoft has expanded its Defender suite to cover the whole of the modern business stack, from mobile devices to cloud services.  Utilising Defender’s capabilities across your business will improve your security by making it harder for criminals to attack you via email, your devices and cloud services.  

Bastion provides a flexible managed solution for Defender that allows you to maximise the benefits of the Defender suite whilst minimising the cost.  We help you to identify which Defender products will give the most benefit and produce a custom strategy to guide your adoption of the premier protection suite for modern businesses.  

Key Benefits

  • Maximise the value that Microsoft's Defender suite can provide to your business
  • Integration with existing security systems
  • Flexible monthly or annual billing
  • Ongoing support and consultancy as you grow and enhance your security capability

Zero Trust


Zero trust is a set of architectural principles designed to help design and implement secure systems.  

It is based on the maxim “trust nothing, verify everything”, and relies on the principles of strong identity and authentication at the user and device level to provide granular access to resources, based on need. 

Bastion can help you on your zero trust journey by providing technical and consultancy solutions tailored to your business needs. 

ColorTokens xTended Zero Trust Platform

ColorTokens is a global software innovator based in California and provides the leading SaaS based cybersecurity platform for implementing zero trust network services.  The ColorTokens model is based on the concept of micro-segmentation, that is confining network access to the minimum level possible while using centrally defined fine-grained access control to ensure the consistent application of security policies. 

This means that the impact of a breach within the network is limited, reducing the scope for even advanced attackers to persist and move throughout the network.  By monitoring traffic as it moves across the network, ColorTokens provides unparalleled visibility of devices and services that are communicating across the network, and whether that connectivity is authorised by the defined security policy. 

Bastion Rampart

Bastion’s managed solution for ColorTokens maximises the value of a zero trust architecture to your business by quickly enabling the deployment and definition and enforcement of a coherent security policy that can be defined in simple English and automatically translated for the network.  A typical ColorTokens deployment includes: 
  • Solution scoping, asset tagging and initial security policy definition. 
  • Solution design including development of a sustainable zero trust architecture and product roadmap. 
  • Deployment of the ColorTokens Management Portal(s), and agent deployment. 
  • Traffic monitoring and recommended security policy enhancements. 
  • Integration with security monitoring solutions. 
  • Full handover documentation and training to your security team. 

Key Benefits

  • Protect your network from advanced threats and ransomeware attacks
  • Comprehensive visibility of communications within the network - eliminate guesswork
  • Minimise breach domains within the networks
  • Flexible billing based on monthly utilisation
  • Ongoing support and consultancy as you grow and enhance your security capability
  • Ongoing support of the platform and regular meetings to support your continuing development of the solution.

Cloud Security Posture Management

Identify critical risks and vulnerabilities buried in your cloud applications and their dependent software libraries including missing security patches and the latest malware. Build an inventory of all cloud resources in AWS, GCP, and Azure to gain complete visibility of your security posture with actionable reports you can use. All without the use of cumbersome agents.

Micro-Segmentation

Xshield deploys seamlessly and delivers deep visibility into network assets and communication flows, segments and protects assets with granular policies that progress from simple enforcement to full Zero Trust.

Secure Remote Access

Bastion’s SRA service allows optimised secure remote access from any endpoint to any service connected to your network or the Internet, whether in the cloud or on-prem using Cato Networks’ global backbone.

Workload and Endpoint Protection

Xprotect locks down endpoints and servers with process control enforcement, and quarantines suspected devices until remediation.

ENDPOINT DEFENCE


Bastion has a range of endpoint protection services that can be implemented to complement your existing security controls.

Xprotect

As part of the ColorTokens Xtended Zero Trust solution, Xprotect locks down endpoints and servers with process control enforcement, and quarantines suspected devices until remediation.

Microsoft Defender for Endpoint

Defender for Endpoint is Microsoft’s cloud-based endpoint detection and response (EDR) tool. Defender helps you rapidly stop threats, scale your security and evolve your defences as part of an eXtended Detection and Response (XDR) or zero trust strategy.

Mobile Threat Defence

Mobile devices are now ubiquitous across both our personal and business lives.  Whilst corporate devices, such as laptops, are generally well protected, the mobile devices that we use for a lot of day-to-day work are not so well shielded.  As the controversy around the NSO Group and their Pegasus malware has shown, mobile devices are just as capable – and therefore vulnerable – as PCs and laptops, with the added concern that a compromised mobile endpoint can have significant real world consequences. 

Key Benefits

  • Defend your business, your colleagues and your customers from mobile threats
  • Integration with existing security systems
  • Flexible monthly or annual billing
  • Ongoing support and consultancy as you grow and enhance your security capability
Bastion has partnered with Zimperium to deliver a cloud-based managed Mobile Threat Defence (MTD) solutions that protect your mobile endpoints as well as traditional endpoints, protecting them from advanced zero-click malware, bad practices and minimise vulnerabilities. Zimperium can deliver all this without requiring the user to hand over control of their device to their employer.

SECURITY MONITORING


Sentinel is a security monitoring, orchestration and automation platform hosted in Microsoft’s Azure public cloud. Sentinel allows you to easily onboard, and process security data to detect attacks and find threats within your environment. It’s easy to setup and get started, but getting the most out of it can be a complex and costly affair.

Managed Sentinel

Bastion’s managed solution for Sentinel maximises the value of Sentinel to your business by quickly providing actionable security data without swamping your security colleagues. Our solution includes the following elements:

  • Solution scoping, log source identification and prioritisation. 
  • Solution design including development of a consistent logging architecture and product roadmap. 
  • Deployment of the Sentinel workspace, including data connectors, custom analytics rules and workbooks. 
  • Deployment of the logging infrastructure. 
  • Full handover documentation and training to your security team. 

Key Benefits

  • Visibility of security incidents and threats within your environment from the leading cloud-ready security monitoring solution
  • Flexible billing based on monthly utilisation
  • Ongoing support and consultancy as you grow and enhance your security capability
  • Ongoing support of the platform and regular meetings to support your continuing development of the solution

DIGITAL RISK PROTECTION


Do you know where all your business data ends up? Are your people compromising their security and that of your business by re-using credentials? Is your customer data being sold on the dark web?

The move to cloud services and remote working has enabled many businesses to get to market faster than would have been thought possible even a few years ago, but the consequence of this approach is a loss of control over your data and that of your customers. Complex supply chains mean that business data can be breached without an attacker ever gaining access to your network.

Bastion’s Digital Risk Protection services, powered by Skurio, allow you to conduct historical searches for compromised data and credentials across a range of sources, and set up alerts for future breaches.

Contact us for more information

Data Breach Monitoring

Bastion can help you monitor for historic and new data breaches that affect your business, employees, and customers. Whether it’s an employee re-using credentials on a breached site, or a customer database out in the wild, we can alert you to new breaches and help to guide you through remediation.

Brand Protection

Activity on the dark web and other areas of the Internet don’t just pose a data risk, they can also be used to damage your brand. Whether it’s the creation of lookalike resources to be used for phishing or other attacks, or misinformation used to tarnish the public view of your business, Bastion can help you detect and defend against threats to your brand.

Bastion’s online brand protection service helps you to stay on top of potential breaches and reputational damage by monitoring a wide range of data sources. Our service protects you from:

  • Impersonation: Domain name cyber-squatting is on the increase and fraudsters are using typo squatting domains to target scams at your customers. Keeping on top of impersonators requires you to know when fake domains are.
  • Fake News: Bad actors and fraudsters can put your brand reputation at risk by spreading false stories or misinformation. To deal with it, you need to monitor what’s being said, by whom, and where.
  • Cyber Incidents: 58% of customers unsure whether they would continue to trust a brand after a cyber-attack, yet data breach is almost inevitable. Convincing customers you care about customer data security is key to trust in your brand.

Threat Intelligence

Whether you’re concerned about threats to your people, data, or technology, Bastion’s Cyber Threat Intelligence platform brings focus to threat intelligence, searching only for threats which are relevant to your organisation. Searches can be conducted across a range of potential sources and the results can be easily filtered and visualised to bring crystal clear focus to potential threats.

Cyber Risk Management


Traditional approaches to security testing through tightly scoped penetration tests leaves organisations with a poor understanding of their exposure to security risks. Penetration tests end up being too tightly scoped to deliver a real picture of the vulnerabilities inherent to your network and services, or the effectiveness of your defences.

Cyber Range

What if you could create a representative copy of your production environment, hook it up to your security tooling and then let an offensive team to simulate a real attack against your defences with no limitations? Through our partnership with SimSpace, Bastion can help you to create representative cyber ranges to conduct simulated attacks, test SOC playbooks and incident response plans, and transform your SOC team into a battle-tested defensive force.

Key Benefits

  • Visibility of security incidents and threats within your environment from the leading cloud-ready security monitoring solution
  • Flexible billing based on monthly utilisation
  • Ongoing support and consultancy as you grow and enhance your security capability
  • Ongoing support of the platform and regular meetings to support your continuing development of the solution

Realistic Cyber Security Training

How would your security operations team really respond to an attack? Are they up to speed with the latest tactics, techniques and procedures used by real-world attackers? Bastion’s Cyber Risk Management platform can provide you with a digital sandbox environment, hooked up to your SecOps tools and backed up by over 700 hours of training material. Give your security teams the opportunity to battle harden themselves and help them enhance their skills in the face of real threats.

Continuous, Automated Penetration Testing

Penetration tests provide a point-in-time view of a system’s exposure to risk. Traditional penetration testing is expensive, time consuming to scope and organise and error prone. You can get a better picture of your exposure to cyber risk by automating testing and associated tasks. OccamSec has designed Incenter to combine multiple solutions in one to enable organisations to make better security decisions and maximize the potential of their security team. Designed to go above and beyond traditional penetration testing, crowd sourcing, penetration testing as a service, and attack surface monitoring. With practically zero deployment time, a continuously evolving range of features, and a focus on helping your organisation secure its environment, based on how it operates.

Secure Access Service Edge


Experience the power of the world’s first true SASE platform with Bastion and Cato Networks. Cato’s SASE solution converges the benefits of SD-WAN  and network security into a global, cloud-native service. Cato optimizes and secures application access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud data centres and mobile users into the network with a zero-trust architecture.

MPLS Replacement

Cato’s private global backbone network means that you can migrate to a flexible, agile SD-WAN solution. With Cato, you can benefit from an end-end optimised, simpler network that lowers costs and improves performance compared with teclo MPLS solutions.

Improve Performance Between Global Locations

Get all the benefits of SD-WAN and a private global backbone without the complexity of multiple point solutions and telco services.

Provide Optimised Secure Internet Access

Utilising Cato’s global backbone network and integrated security stack, it’s easy and cost-effective to provide secure Internet access for all locations in your organisation.

Optimise and Secure Cloud Access

Avoid exposing your cloud services to untrusted Internet connections or the use of complex and expensive direct connection technologies. By leveraging Cato’s fully features converged security stack you can provide a consistent security policy across cloud and non-cloud resources from one solution.

Optimise and Secure Mobile Users

Use Cato’s client or clientless mobile access options to secure mobile and remote access across your global network including cloud, data centres and branch locations.
To find out more, or request a free trial:
Experience true SASE
KnowBe4
Cato Networks
Zimperium
Skurio
Simspace
Colortokens