is a managed, easy-to-use, flexible and versatile Internet management and cyber-security service for small businesses and home offices.

Cyber-security is a Dynamic Specialty

Cyber defense evolves faster than any other area in IT and technology. Defenses adapt to new attacks, and just as quickly attacks adapt to those new defenses. Companies need to effectively manage risk, but they also need to manage cost and minimize the impact to business processes. Achieving all of these goals requires access to domain specialists and custom, state-of-the-art technology.

The subscription service includes access to domain specialists and custom technology providing not just effective cyber risk management, but cost-effective cyber risk management.

Subscription-based cyber-security is Efficient

Our subscription plans include both state-of-the-art security technology and dedicated domain expertise with no need to buy equipment or learn complex, special purpose technology. A subscriber gets the experience of domain specialists that constantly learn from an entire portfolio of networks and can adapt quickly to provide cyber-defensive best practices.


  • Deny and allow listing of devices
  • Deny and allow listing of domains
  • Deny and allow listing of services
  • Deny and allow listing of protocols
  • Deny and allow listing of networks
  • Deny and allow listing of geographies
  • Network and machine traffic audits
  • Network and machine configuration audits
  • IoT and IIoT audits
  • Secure, off-site, redundant storage of logs
  • Secure, off-site, redundant storage of audit trails
  • Automatic periodic reports
  • Real-time notifications
  • Precise security perimeters and zones
  • Multi-site and remote worker support

Ease of use

  • Automatically updated
  • Managed by domain experts
  • Analyzed and audited by domain experts
  • Dynamic and Flexible

    • Per-person settings
    • Per-server settings
    • Per-machine settings
    • Per-network settings
    • Guest settings
    • Unlimited devices per person
    • Scheduled notifications and triggers
    • On-demand notifications and triggers
    • On-event notifications and triggers
    • Flexible remote management
    • Secure and confidential