• +32 9 277 90 00
  • info@itaf.eu
  • Mo - Fr: 9 AM - 6 PM
  • Dutch
  • French

Managed Security Services

Services Partner

Management and information security comes as very important steps in securing your workstations and users. Detect and respond to cyber attacks before your critical data is compromised and let us be your managed security services provider.

Anti-virus and anti-malware protection
Secure Desktop Management
Desktop security patching
Server security patching
Secure data disposal
Managed Security Services Partner

What is the difference between
anti-virus and anti-malware?

An advanced anti-virus and anti-malware solution for your business.

Anti-virus focuses on prevention, protecting a machine by stopping it from becoming infected in the first place. Anti-malware, however, is geared towards rooting out and destroying malicious programs that have already been downloaded and activated. While there is a lot of crossover between the two tools, many security experts advise using both antivirus and anti-malware tools together in order to maximise protection.

How can ITAF help you with implementing the anti-virus and anti-malware software?

Whether it is about the general purpose protection for your end-points or on the other hand more specialized layer of defence specifically designed to fight the ransomware (link to ransomware blog post page) and Trojans, ITAF will provide you a first class service and consultancy (link to contact form) in guarding your devices/operating systems from exploits and viruses. This for end-points and for servers.

What is the difference between
anti-virus and anti-malware?

An advanced anti-virus and anti-malware solution for your business.

Anti-virus focuses on prevention, protecting a machine by stopping it from becoming infected in the first place. Anti-malware, however, is geared towards rooting out and destroying malicious programs that have already been downloaded and activated. While there is a lot of crossover between the two tools, many security experts advise using both antivirus and anti-malware tools together in order to maximise protection.

How can ITAF help you with implementing the anti-virus and anti-malware software?

Whether it is about the general purpose protection for your end-points or on the other hand more specialized layer of defence specifically designed to fight the ransomware (link to ransomware blog post page) and Trojans, ITAF will provide you a first class service and consultancy (link to contact form) in guarding your devices/operating systems from exploits and viruses. This for end-points and for servers.

Secure Desktop Management

The role of integrated desktop management
keeping your organisation’s endpoints secured

Secure and integrated desktop management is getting more important since GDPR has been introduced. Several aspects of the integrated desktop management solution by ITAF focus on helping an organisation keeping the personal data of end users secure. Of course the main goal remains proper, secure and efficient end user support.

The key features where ITAF can help you with integrated desktop management:

Asset
management

Integrated desktop management allows you to manage software licenses, track software usages, detect and uninstall prohibited software. Next to this it can alert on specific events and track all end user computers deployed across a network providing hardware and software audit data.

Remote
support

Due to the integrated desktop management solution, a Service Desk operator can quickly establish a remote connection to the desktop of an end-user and provide the necessary support.

Software
deployment

An integrated desktop management solution allows for fast distributing of software packages to all end-points. The software gets installed in the computers without the users intervention.

Comprehensive
reporting

Several reports can be generated using the integrated desktop management solution. Reports about asset management, software usage, software licenses compliance and so on.

GDPR

Using integrated desktop management allows proper user management with logging and allows you to track, identify records and create a clear view of your data affection.

Secure Desktop Management

The role of integrated desktop management
keeping your organisation’s endpoints secured

Secure and integrated desktop management is getting more important since GDPR has been introduced. Several aspects of the integrated desktop management solution by ITAF focus on helping an organisation keeping the personal data of end users secure. Of course the main goal remains proper, secure and efficient end user support.

The key features where ITAF can help you with integrated desktop management:

Asset
management

Integrated desktop management allows you to manage software licenses, track software usages, detect and uninstall prohibited software. Next to this it can alert on specific events and track all end user computers deployed across a network providing hardware and software audit data.

Remote
support

Due to the integrated desktop management solution, a Service Desk operator can quickly establish a remote connection to the desktop of an end-user and provide the necessary support.

Software
deployment

An integrated desktop management solution allows for fast distributing of software packages to all end-points. The software gets installed in the computers without the users intervention.

Comprehensive
reporting

Several reports can be generated using the integrated desktop management solution. Reports about asset management, software usage, software licenses compliance and so on.

GDPR

Using integrated desktop management allows proper user management with logging and allows you to track, identify records and create a clear view of your data affection.

Desktop security patching

Periodical patching of vulnerabilities of the OS and 3rd party software

The objective of desktop security patching practice is to pro-actively fix known software vulnerabilities by ensuring that all security-related patches are installed on the customer’s end users’ computers. Security patching is an imperative part of an overall good security practice that avoids leaving systems vulnerable to known security faults which could pose a threat to the confidentiality, integrity or availability of the customer’s data.

Key features of this service comprise:
• Automated installation of security patches on end user computers covering Microsoft and Mac patches as well as widely used third-party applications like Adobe Acrobat, Mozilla Firefox, Java, and so on.
• Full control over when patches are downloaded and installed, allowing the user the skip the installation of the software up to a defined number of times before enforcing the installation
• Full visibility and reporting possibilities on patch deployment & status
• Ability to create on demand tasks for manually pushing patches

What tools ITAF security specialists use for desktop security patching?

ITAF uses a specialised tool for the deployment of security patches, which covers both Microsoft software, Mac software and 3rd party software for both Windows and Mac Operation Systems.

ITAF applies a standard patch policy and deployment schedule which includes the following characteristics:
• For Microsoft products, only patches marked as Security Updates by Microsoft are installed for all Microsoft products supported by the tool.
• For Mac and 3rd party products, only patches marked as Critical, Important or Moderate are installed
• The ability for users to delay the deployment and/or associated reboot of their computers up to a specified maximum number of days
• This policy is subject to change at any given moment in time without the requirement for ITAF to pro-actively inform the customer

Desktop security patching

Periodical patching of vulnerabilities of the OS and 3rd party software

The objective of desktop security patching practice is to pro-actively fix known software vulnerabilities by ensuring that all security-related patches are installed on the customer’s end users’ computers. Security patching is an imperative part of an overall good security practice that avoids leaving systems vulnerable to known security faults which could pose a threat to the confidentiality, integrity or availability of the customer’s data.

Key features of this service comprise:
• Automated installation of security patches on end user computers covering Microsoft and Mac patches as well as widely used third-party applications like Adobe Acrobat, Mozilla Firefox, Java, and so on.
• Full control over when patches are downloaded and installed, allowing the user the skip the installation of the software up to a defined number of times before enforcing the installation
• Full visibility and reporting possibilities on patch deployment & status
• Ability to create on demand tasks for manually pushing patches

What tools ITAF security specialists use for desktop security patching?

ITAF uses a specialised tool for the deployment of security patches, which covers both Microsoft software, Mac software and 3rd party software for both Windows and Mac Operation Systems.

ITAF applies a standard patch policy and deployment schedule which includes the following characteristics:
• For Microsoft products, only patches marked as Security Updates by Microsoft are installed for all Microsoft products supported by the tool.
• For Mac and 3rd party products, only patches marked as Critical, Important or Moderate are installed
• The ability for users to delay the deployment and/or associated reboot of their computers up to a specified maximum number of days
• This policy is subject to change at any given moment in time without the requirement for ITAF to pro-actively inform the customer

Server Security Patching

What does server security patching include?

The server security patching service includes the activities related to the monitoring and implementation of security updates on the server systems of a customer. The server operating systems and third party software is being patched on a permanent basis.

• For Windows, automated security patching runs on a weekly basis to install all official security related updates published by Microsoft. This service delivers updates for Microsoft operating systems and other Microsoft software products for which Microsoft provides a security update service.
• Any other software is excluded from the automated security patching service.

How can ITAF manage server security patching and permanent patching of the vulnerabilities of your servers.

When ITAF is signalled by its server security patching monitoring systems that an update has failed or did not run, a staff member creates a pro-active incident ticket based on which the customer will be informed about the alert. This triggers an investigation to identify the root cause of the security update failure and any corrective actions that may be required to result in successful security updates. Corrective actions are tracked in a change request ticket.

Server Security Patching

What does server security patching include?

The server security patching service includes the activities related to the monitoring and implementation of security updates on the server systems of a customer. The server operating systems and third party software is being patched on a permanent basis.

• For Windows, automated security patching runs on a weekly basis to install all official security related updates published by Microsoft. This service delivers updates for Microsoft operating systems and other Microsoft software products for which Microsoft provides a security update service.
• Any other software is excluded from the automated security patching service.

How can ITAF manage server security patching and permanent patching of the vulnerabilities of your servers.

When ITAF is signalled by its server security patching monitoring systems that an update has failed or did not run, a staff member creates a pro-active incident ticket based on which the customer will be informed about the alert. This triggers an investigation to identify the root cause of the security update failure and any corrective actions that may be required to result in successful security updates. Corrective actions are tracked in a change request ticket.

Secure Data Disposal

There are several complexities associated with security when speaking about data disposal, as the companies can not just throw away their old equipment as they like or pass them to the third party companies due to the associated data security, safety, confidentiality, compliance and environmental risks/policies with it. For disposal of outdated IT assets such as servers, hard drives, storage, networking and other data center equipment, ITAF is providing a secure environment friendly data disposal service with a comprehensive solution for data security following all the International Security Standards.

How can ITAF help you with Secure data disposal?

Hardware registration – You can contact ITAF support and after the completion of registration, we will set an inventory to capture your outdated IT assets’ serial numbers, models and quantities.
On site data destruction – At ITAF we have well trained and experienced professionals, that can assist you in selecting the most secure and suitable method of destroying your data. We also offer on-site & off-site services such as: data wiping, degaussing, crushing and shredding.
Hardware recycling – To guarantee zero landfill, zero incineration, ITAF utilizes recognized green solutions. We ensure that all the materials are processed in an eco-friendly manner to maximize the re-use of all the components.
Secure data disposal acknowledgement – At the end of the process, ITAF’s team will provide full documentation, acknowledging that the Data was destroyed and/or your outdated IT assets were recycled according to the industry’s best practice.

Secure Data Disposal

There are several complexities associated with security when speaking about data disposal, as the companies can not just throw away their old equipment as they like or pass them to the third party companies due to the associated data security, safety, confidentiality, compliance and environmental risks/policies with it. For disposal of outdated IT assets such as servers, hard drives, storage, networking and other data center equipment, ITAF is providing a secure environment friendly data disposal service with a comprehensive solution for data security following all the International Security Standards.

How can ITAF help you with Secure data disposal?

Hardware registration – You can contact ITAF support and after the completion of registration, we will set an inventory to capture your outdated IT assets’ serial numbers, models and quantities.
On site data destruction – At ITAF we have well trained and experienced professionals, that can assist you in selecting the most secure and suitable method of destroying your data. We also offer on-site & off-site services such as: data wiping, degaussing, crushing and shredding.
Hardware recycling – To guarantee zero landfill, zero incineration, ITAF utilizes recognized green solutions. We ensure that all the materials are processed in an eco-friendly manner to maximize the re-use of all the components.
Secure data disposal acknowledgement – At the end of the process, ITAF’s team will provide full documentation, acknowledging that the Data was destroyed and/or your outdated IT assets were recycled according to the industry’s best practice.

Pricing Options

Secure Desktop
Management

2.50
/per desktop
  • Asset Management
  • Remote Support
  • Software Deployment
  • Comprehensive Reporting
  • GDPR

Desktop Security
Patching

2
/per desktop
  • Automated installation
  • Security Updates by Microsoft
  • Critical, Important or Moderate
  • Delayed deployment
  • Associated computer reboot

Server Security
Patching

15
/per server
  • Weekly security patching
  • Official Microsoft updates
  • Update failure notification
  • Other software exclusion
  • Correactive actions tracking

Managed Security Services Partner

Hold Your Infrastructure in Safe Hands

With managed security, you’re able to focus on strategic security priorities, as the provider manages the day-to-day threat management, data protection, and ongoing compliance requirements.

As your trusted security partner, ITAF Managed Security Services offers around-the-clock monitoring, management and response to advanced threats, risks and compliance requirements.

For more information about ITAF Managed Security Services please contact us and we’ll be glad to help you!

  • info@itaf.eu
  • +32 9 277 90 00

Better to be safe than sorry.

Go back to Security Services page and discover more info...

Why ITAF?

Expericence and knowledge in figures and facts

ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.

ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.

ITAF has more than 20 years of international experience and expertise in IT infrastructure projects, business applications implemenation and licencing and IT support services.

Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.

Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.

Serving, educating and advising more than 1500 customers in Belgium and internationally – building, managing and supporting SMB’s, corporate’s and government IT infrastructures.

More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.

More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.

More than 60 specialized and certified specialists and consultants ready to help from A-Z issues and tasks related to the ICT products and services implementation and support.

More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.

More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.

More than 3650 succesfuly delivered projects with wide range ICT infrastructure complexity.

ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.

ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.

ITAF has its own space in multiple datacenters with an advanced multiservice network. We can provide you internet access and a private network connection between your office and your servers in our own datacenter.

Certified and proud partner of
Microsoft, Dell, HP, Cisco, Trend Micro...

Certified and proud partner of
Microsoft, Dell, HP, Cisco, Trend Micro...

Certified and proud partner of
Microsoft, Dell, HP, Cisco, Trend Micro...

ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.

ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.

ITAF’s focus are both Business Technology and proper hardware and tooling that create the difference and impact.

Slider
Related to this category
Scroll Up