Persist Security is a leading cyber and information security company, offering Enterprise level security solutions for small to medium-sized business at affordable costs, without the need to hold local IT and security teams

 The Teams:

We are highly trained individuals with diverse expertise and experience that originated in security agencies, the military, intelligence forces, and high-tech industries. with vast experience in offensive and defensive hacking technics

 Our Vision:

Persist was founded with a vision of helping small to medium business implement the same Enterprise level cybersecurity solutions without the need to employ high-cost cybersecurity or IT teams.

The optimal Security packge for any company. 

Persist Safeguard is a turn-key solution for security. Included all security aspect business needs ,  24X7 SOC monitoring , all protection Application for Security EDR , XDR , FW , CISO hours, Employees Awareness  regulation services IR team&Crisis management.

With our state-of-the-art solutions, we will deploy and manage this service in your organization, and respond to any event, have our team of Experts review it 24×7 and separate the false events from true ones.

  •  Mail protection. Protects from any malicious linked files and attachment, including sandboxing of suspicious files.

  • Securing users’ connection with MFA (Multifactor Authentication).

  • Cloud-native security orchestration platform, that allows complete view of the organization’s activities and risks.

  • EDR+XDR Secure endpoint solutions, designed to prevent, detect, and help remove threats in an efficient manner from computer Systems.

  •  Securing the browsing and DNS vectors. Web category management – filtering Web contact and apps by category base.

  • DLP Data Leaking Prevention – enable organisations to make sure information isn’t leaking out  

Our SOC team Monitoring for you all security event and more 24×7 and act upon themHere are few examples of events:

  • Failed login & MFA failures – a failed login might indicate a brute-force attack into the organization.
  • Access to Sensitive files and Network Dries 
  • Users permission elevation – can indicate take control on Admin permissions.
  • Computers and server infection and behavior and Analysis. 
  • Firewall traffic – firewall traffic analysis can indicate an information leak from the organization, as well as various attacks and port scanning in progress on network devices.
  • Geolocation anomalies – when a user usually connects from a specific location the system, will flag a connection from a different geolocation (states) as a risk and generate an alert. Also, users will not be able to connect from a different location when the time to get to the location is lower than the connection threshold.
  • Social engineering attempt on executive – this can indicate a possible breach and attempt to manipulate users .

    We monitor all the above and more with our expert analysis team, and your organization will only be alerted if it is a true incident.

Cyber Incident Response is a methodical approach to effective, efficient management by cyber security experts in cases of cyber-attacks, data breaches, data leakage, ransomware, extortion, and other cyber risks. The IR team’s mission is to minimize downtime, to enable the organization to resume its normal activity, to mitigate the breaches, to provide information security consulting, and minimize damage in terms of cost and reputation.

We operate:

  • Expert forensic&Threat Intelligence Teams 
  • Legal & Regulations Teams
  • Crisis Managmet
  • PR consolations  

The service enables a company of any size to access high-level security expertise easily and cost-effectively. We do not simply deliver the knowledge of one person, but instead offer the combined expertise of all of Persist’s information security experts. 

The service can be scaled up and down according to individual business needs, and it allows organizations to remain focused on their core business objectives while still benefiting from a robust information security management system. 

  • Technical review of the org Systems.
  • Review regulation and Laws ( PCI . GDPR, HIPPA).
  • Mapping risk attacks vectors and procedures.
  • Improve security and awarness.  

 

The service enables a company of any size to access high-level security expertise easily and cost-effectively. We do not simply deliver the knowledge of one person, but instead offer the combined expertise of all of Persist’s information security experts. 

The service can be scaled up and down according to individual business needs, and it allows organizations to remain focused on their core business objectives while still benefiting from a robust information security management system. 

  • Review the Organization Security Gaps. 
  • Review the technical and the regulated aspect of security. 
  • Prepare Closing the Gaps Work-plane.
  • recommended improvement and future steeps.  

With the right training and knowledge, your employees can also be the most powerful tool to fight off these hacking attempts. Our personalized cyber security guidance could make a significant difference in the level of your information’s safety.

  • Hacking demonstration
  • Guide lines for Safety , passwords , MFA, threats review
  • Phishing
  • Smashing
  • Veshing
  • Other social engineering and manipulations
  • OSINT gathering from the internet 

Penetration tests

Our team will check that your network and application are secure , and now risk for data lose or data leaking , in addition to application manipulation

  • Nessus discovery and vulnerability, checks. 
  • Mapping  the risk and vulnerabilities 
  • SLDC guidelines
  • Cloud security
  •  Applications pen test.
Our clients