The following Service Description covers the Amplify IT Cybersecurity/Advanced Cybersecurity solution and its components. For a full description of our overarching Managed Services covering response time expectations, implementation/onboarding, how we provide support, limitations and client responsibilities please start here.
Amplify IT Cybersecurity, as its own offer, is a foundational security package designed to protect against the most prevalent cyber threats, ensuring the integrity and confidentiality of your organization’s data.
It contains the following services:
Service | Description |
---|---|
Endpoint Detection & Response (EDR) | Provides continuous, real-time monitoring of devices to detect and respond to cyber threats as they happen. This proactive approach helps ensure a business stays protected from malware, ransomware, and other device-level attacks, minimizing potential damage and downtime. |
Email Threat Monitoring and Protection | Offers a robust defense against phishing, malware, and other email-based threats, helping business communications remain secure. Includes advanced detection capabilities to help identify and respond to signs of account compromise, protecting sensitive information and maintaining trust between ITS and clients. |
Dark Web Monitoring | Searches the dark web for signs that a company’s sensitive data may be at risk. By detecting potential threats early, a business can take swift action to protect data and mitigate the impact of a breach. |
M365 Shield | Provides threat detection across infrastructure and cloud environments. This service aids in ensuring the Microsoft 365 ecosystem and SaaS applications remain secure, working to protect a business from sophisticated cyber threats and ensuring uninterrupted operations. |
Security Awareness Training | Designed to equip employees with the knowledge and skills to recognize and prevent cyber threats such as phishing, malware, and vishing. By fostering a culture of security awareness, a business can reduce the risk of human error and strengthen the overall security posture. |
When bundled as part of Total IT or any of our industry targeted solutions, Amplify IT Cybersecurity is elevated to Amplify IT Advanced Cybersecurity with the following additional services:
Service | Description |
---|---|
Multifactor Authentication (MFA) | MFA is an essential layer of security that requires multiple forms of verification before granting access to systems. This robust approach significantly reduces the risk of unauthorized access, protecting a business’s sensitive data and resources. |
Web & DNS Protection | Implements advanced security measures to safeguard a business against web-based threats, providing granular control over internet access. This helps ensure a safer browsing experience for employees, reducing the risk of cyber-attacks originating from malicious websites. |
The following details each of these services.
ITS’s EDR Service is engineered to provide advanced cybersecurity defense mechanisms to organizations, detecting and responding to cyber threats at endpoints in real time. This service is crucial in today’s high-threat digital environment, providing layered security through monitoring, detection, response, and predictive threat intelligence.
EDR as a service, is designed to secure endpoints — from workstations to servers to endpoints in the cloud — against sophisticated attacks and malware outbreaks.
Always-On Protection | A small program is installed on each device that watches for suspicious behavior – like strange new programs running or unusual network connections. It’s like having a security guard constantly patrolling each computer. |
Smart Threat Detection | The system learns what normal activity looks like on a client’s network. When something unusual happens, it flags it immediately – even catching sophisticated attacks that traditional antivirus programs might miss. |
Automatic Threat Response | When a threat is detected, the system responds instantly – isolating affected devices from the network, stopping harmful programs, and blocking unauthorized connections. This happens automatically, before damage can spread. |
Investigation Tools | If something does happen, the system provides a detailed timeline of exactly what occurred, helping an IT team understand how the attack happened and prevent similar incidents in the future. |
Self-Improving Security | The system gets smarter over time by learning from each incident, making the protection stronger against new types of attacks. |
The client must provide:
Return to Advanced Cybersecurity Services
This service is a security measure that monitors and helps protect the email platform and employee mailboxes from a broad spectrum of email-borne threats, including phishing attacks, malware, and spam, while also monitoring systems for signs of account compromise. This dual approach assists in ensuring not only the filtration of malicious emails before they reach users but also vigilance against potential account security breaches.
Email Filtering | Each email is first filtered against a list of known spammers and phishers, then opened in a fully automated sandbox environment where any email attachments and web links are detonated. The outputs from this isolated sandbox testing then undergoes rigorous analysis for signs of phishing, malware, and spam. Sophisticated algorithms and near-real-time, dynamic threat intelligence are employed to help preemptively block harmful content before it ever reaches its intended target. |
Continuous Security Monitoring | Continuous monitoring for unusual account behavior by analyzing patterns and behaviors that deviate from established norms such as atypical login activities, unexpected email forwarding settings, or other signals of potential account compromises. |
Threat Detection | The service leverages filtering and sandboxing analysis to dynamically scan for emerging threats. The system adapts in near-real-time to new tactics used by attackers to help ensure even the most sophisticated phishing schemes are identified and mitigated. |
Automated Alerts | When a potential threat or suspicious activity is detected, automated alerts are generated to administrators. This prompt notification allows for quick investigation and remediation actions to mitigate potential damage. |
Quarantine & Alerts | Most potentially dangerous emails are quarantined, with alerts sent to both users and administrators. This process works to deter interaction with harmful content and aids in informed decision-making. |
User Reporting | Users are encouraged to report suspicious emails, enhancing the overall effectiveness of the threat detection system. This collective defense mechanism improves the service’s accuracy and responsiveness over time. |
Return to Advanced Cybersecurity Services
DWM is like a digital watchdog that keeps an eye on hidden parts of the internet to see if important information – like emails, website names, company leadership’s private information, or computer addresses – is being talked about or traded by online criminals. This helps companies catch problems early, so they can fix them before real damage happens.
Every day, the service searches the dark web to find any signs that a client’s data might be in danger. It uses smart computer tools to decide which issues are the most serious so that ITS knows exactly what needs attention first.
Return to Advanced Cybersecurity Services
M365 Shield is a security monitoring platform designed to protect SaaS applications by detecting and alerting suspicious activities, data access anomalies, and potential threats in real time. It provides IT teams with critical insights into user behaviors across cloud platforms, enhancing data security and compliance.
Return to Advanced Cybersecurity Services
SAT teaches how to recognize and prevent cyber threats. Think of it as creating a “human firewall” for the business – because up to 95% of data breaches involve human error. With cyber threats becoming more sophisticated in 2025, including AI-powered attacks, this training is more important than ever.
Phishing Testing |
|
Employee Training |
|
Return to Advanced Cybersecurity Services
MFA is a critical security layer that requires users to verify their identity through multiple methods (something they know, have, or are), creating a robust defense that prevents attackers from gaining access even if passwords are compromised.
By requiring a second verification method, MFA creates a powerful additional layer of protection that significantly reduces the risk of unauthorized access.
Our MFA standard configuration recommends the following integrations be implemented. The implementation services to deploy the standard configuration is a separate, chargeable services engagement.
Integration | Description |
---|---|
Remote Access Application | Integrates with compatible remote access applications, such as client VPN solutions and Microsoft Remote Desktop Gateway. |
Microsoft 365 | Leveraging the native MFA functionality within Microsoft 365, requiring users to use a smartphone mobile app for the second factor. This utilizes Microsoft’s built-in security features. |
MFA can be deployed beyond Microsoft 365, VPN and Microsoft Remote Desktop Gateway to further strengthen the client’s security posture. Additional integrations can be implemented for Workstations, Applications, and Windows Server. These additional integrations may require a RADIUS implementation and/or Microsoft licensing to include support for Conditional Access. These implementation services need to be customized for individual client environments and their unique applications and are separately charged.
Integration | Description |
---|---|
Windows Workstation | ITS offers the option to extend MFA protection to workstation logins, allowing for customization to meet specific organizational security needs. |
Applications | Beyond the standard configuration, MFA service offers the potential for integration with a wide array of applications. |
Windows Server | Integrates with the interactive Windows Server login to reduce the risk of unauthorized access. |
Microsoft 365 Licensing: MFA implementation for applications and servers may require Conditional Access features found in certain Microsoft licensing subscriptions. Conditional Access is available with Microsoft Entra ID P1 and P2; Microsoft 365 Business Premium; Microsoft 365 E3, E5, F3; and EMS E3 and E5. These licenses are not included in the MFA service and are at an additional cost. |
The typical implementation process, scoped and billable by Professional Services, has the following steps:
1 | Assess & Strategize | Assessment of existing IT infrastructure to identify integration points for the MFA system for Remote Access Application and Microsoft 365 for a tailored deployment strategy and setting of milestones. |
2 | Finalize Scope | Finalize scope and provide a SOW which will include Professional Services and a quote for Microsoft licensing upgrade or add-on if Conditional Access is required. |
3 | Configure & Integrate | Configuration of the MFA service, integration with Remote Access Application, Microsoft 365 and additional scoped services, optimization of settings for security and convenience, and execution of a thorough testing phase. |
4 | Enrollment Enablement | Professional Services can either enable MFA for users or can assist with self-enrollment enablement. ITS can generate a customized email campaign with instructions on how to self-enroll in MFA that helps guide users through the setup of authentication methods. |
5 | Provide Training | Provide end-users with easy-to-access guides and IT staff with support training. |
6 | Activate System | Activation of MFA across the organization, with support ready to address any issues and monitor the system post-activation. |
7 | Steady State | Offering continuous support following system activation, providing regular updates, and ensuring MFA is operational and secure. |
Comprehensive Integration Capability* | MFA integration across most cloud services, email platforms, remote access systems, VPNs, on-premises applications, and workstation & server logons. |
Flexible Authentication Options | Offers push notifications, hardware tokens, SMS codes, and automated voice calls for user-friendly verification. |
Alternative Authentication Scenarios | Provides options like temporary access codes, backup authentication methods, passwordless access, time-based one-time passwords, and support assistance for lost access scenarios. |
Single Sign-On (SSO) | Enhances user experience by allowing one-time authentication for multiple services. |
Delegated Admin Control | Enables role-based administrative access, allowing specific permissions for managing MFA settings and user accounts. |
Granular Access Policies | Customizable policies for detailed access control based on user and device attributes. |
* Some items here may require scoping and professional services to integrate
Return to Advanced Cybersecurity Services
Web & DNS Protection defends against web-based threats while controlling internet access. This includes blocking access to malicious websites, filtering unwanted content, and protecting against web-based exploits.
Scoping
Configuration
Monitor implementation
Completion