Managing IT Complexity

and Expanding IT Capacity

When your Business Success and Technology are Inseparable

The problems we solve:

Infrastructure Security
Monitoring &
Management
Service Desk
On site Engineering
Project Services

INFRASTRUCTURE SECURITY

As your trusted advisor, Excensure addresses your security needs from the simplest to the most complex. Our Security workflow includes:

  • Monitor security threats
  • Manage security threats
  • Remediate Threats
  • 24/7 support
  • Expansion of your team
  • Continuous process improvements

We provide augmented services including threat, cloud, infrastructure, data, identity and response management.

MONITORING & MANAGEMENT

Our Network Operations Center (NOC) extends the capabilities of your organization based on your business and technical requirements. We believe there is no “one-size-fits-all” solution.

  • Network monitoring
  • Infrastructure management
  • Cost-effective solutions
  • Governance

Our agile and flexible monitoring and management solutions are oriented around managing daily, repetitive IT tasks, and allow your team to focus on higher level projects and problems.

 

SERVICE DESK

Our service desk’s operational framework is built to discover, explore, execute, close, and solve the technology issues that run your business. 

You can contact the service desk by:

  • Phone
  • Email
  • Web-chat
  • Web-form

Our service desk is staffed by Level 1 Engineers 100% in the United States and is available a true 24/7. Our Engineers answer the phone and begin solving end-user issues right away.

ONSITE ENGINEERING

On-site engineering is included for managed services clients. It is part of the onboarding process but may also serve other uses:

  • Initial assessment (on-site survey)
  • Available for on-site remediation
  • On-site project work

PROJECT SERVICES

Excensure provides Subject Matter Expertise (SME) on a wide variety of solutions. Some examples include:

  • Infrastructure design and upgrade
  • Office relocation
  • Cloud migration (Azure/AWS)

What makes us different?

At Excensure, we aren’t “Managed Services as usual”. Our singular MS focus provides the most comprehensive solutions to protect, monitor and manage your technology ecosystem.

Without Time and Materials clients, our focus to our MS clients is never diluted.
Get A Quote
Expand your IT capacity at a fraction of your costs.

We take on the critical repetitive tasks that ensure best IT practices and enable your team to focus on their tasks and project work.
Get A Quote
We provide line-item detailed pricing. You know exactly which Excensure solutions and tools you are choosing for deployment in your environment.
Get A Quote
How do you know what your MSP is accomplishing? With Governance as a guiding principle, Excensure assigns a Technical Account Manager (TAM) for weekly meetings to review reports, issues, and action items.
Get A Quote

What makes us different?

At Excensure, we aren’t “Managed Services as usual”. Our singular MS focus provides the most comprehensive solutions to protect, monitor and manage your technology ecosystem.

Without Time and Materials clients, our focus to our MS clients is never diluted.
Schedule A Call
We are your budget-friendly option to expand your IT Department

We’ll tackle time consuming tasks and empower your team to focus on higher priority tasking. Together we’ll accomplish more, and make sure the right things are accomplished.
Schedule A Call
Do you know what is and is not included in your MSP’s Pricing?

We provide line-item, detailed pricing. You know exactly which Excensure solutions and tools you are choosing for deployment in your environment.
Schedule A Call
How do you know what your MSP is accomplishing? Excensure builds custom dashboards and assigns a Technical Account Manager (TAM) for weekly meetings to review reports, issues, and action items.
Schedule A Call

How We Approach managed services

Using the Center for Internet Security framework as our reference.. Excensure evaluates your IT environment to ensure best practices for a Secure Managed Service

Center for Internet Security Controls

The CIS Controls® are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks. They are developed by a community of information technology (IT) experts who apply their first-hand experience as cyber defenders to create these globally accepted security best practices. 

Click to reveal control details.

2

Inventory and
Control of 
Software Assets

7

Continuous 
Vulnerability 
Management

8

Audit Log
Management

9

Email and
Web Browser 
Protection

10

Malware
Defenses

11

Data
Recovery

12

Network
Infrastructure
Management

13

Network
Monitoring 
and Defense

14

Security 
Awareness and 
Skills Training

15

Service 
Provider 
Management

16

Application 
Software 
Security

17

Incident
Response
Management

18

Penetration 
Testing

CIS Control Categories Legend
Manage and Monitor
Secured Communication
Access Control
Security Policies
Device Security
Data Collection/Reporting

Solutions

Click to reveal solution details.

Work Security

At Excensure, we protect your underlying network infrastructure from unauthorized access, misuse, or theft.  Our Network Security Solutions are comprised of hardware and software solutions as well as configurations and processes.

  • Access Control
  • Virus and antivirus software
  • Application security
  • Network Analytics
  • Types of network-related software (endpoint, web, wireless, etc.)
  • Virtual Proxy Network (VPN) encryptions
  • Next-Generation Firewalls
  • And much more

Next-Generation Firewalls

As a portion of our network security solutions, Excensure deploys next-generation firewalls (NGFWs), a network security device that provides capabilities beyond a traditional firewall. Next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.

Penetration Testing

Excensure utilizes Penetration Testing (Pen Testing) to evaluate the strength of your company’s network infrastructure. Penetration Testing allows us to identify vulnerabilities and help you manage those weaknesses. We understand that Penetration Testing is not a one-size-fits-all delivery. We have multiple Pen Testing solutions to tailor a custom solution to meet your needs.

Email Threat Protection

Excensure uses multi-layered protection and Single point application to examine multiple characteristics and detect targeted  phrases and campaign patterns (zero-hour malware). We also prevent such common attacks like:

  • Malware
  • Phishing emails
  • Ransomware
  • Email spoofing
  • Spam

 

Cloud Migrations

At Excensure, we protect your underlying network infrastructure from unauthorized access, misuse, or theft.  Our Network Security Solutions are comprised of hardware and software solutions as well as configurations and processes.

  • Access Control
  • Virus and antivirus software
  • Application security
  • Network Analytics
  • Types of network-related software (endpoint, web, wireless, etc.)
  • Virtual Proxy Network (VPN) encryptions
  • Next-Generation Firewalls
  • And much more

Operating System Patching

Excensure utilizes OS Patch Management to distribute and apply updates to Operating System software. We use patches to correct vulnerabilities in the software. Applying patches ensures network infrastructure is not susceptible to exploitation or attack.

Sharepoint Migrations

At Excensure, we protect your underlying network infrastructure from unauthorized access, misuse, or theft.  Our Network Security Solutions are comprised of hardware and software solutions as well as configurations and processes.

  • Access Control
  • Virus and antivirus software
  • Application security
  • Network Analytics
  • Types of network-related software (endpoint, web, wireless, etc.)
  • Virtual Proxy Network (VPN) encryptions
  • Next-Generation Firewalls
  • And much more

Backup & Recovery

Excensure’s Managed Backup and Recovery strategy combines on-premise products, local backups, and cloud storage to ensure our clients recover as quickly as possible from both major and minor data loss incidents and ransomware attacks.

Excensure Conducts a detailed requirements analysis of your systems to determine:

  • Data backup, recovery, and restoration 24X7 options
  • Optimum cost-effective secure protection of your data assets
  • Ensuring high availability, low downtime, and minimal business disruption
  • Perform regularly scheduled testing
  • Monitor, manage and remediate as needed

Microsoft Office

As companies move portions of their business to some form of cloud computing, the move to Office 365 is becoming more prevalent for their cloud-based communication, collaboration and productivity abilities. To take advantage of the full suite of Microsoft Services requires Subject Matter Experts (SMEs) and migration experience:

There is a process to follow to determine what type of Office 365 migration (staged, cutover, hybrid, IMAP) best suits your organization.

This process includes:

  • Investigation of Requirements
  • Pilot(s)
  • Initial Data Migration and Testing
  • Cutovers
  • Follow Up, Documentation and QA

The expertise includes a dedicated Senior Project Manager and a lead SME.

Vulnerability Scans

Excensure provides an industry-leading, end-to-end, comprehensive vulnerability coverage with the ability to predict which security threats to remediate first. We provide a risk-based view of your entire attack surface so we can quickly identify, investigate, and prioritize vulnerabilities.

 

SD-Wan Requirements

SD-WAN Expertise by Excensure Subject Matter Experts who have owned, engineered and managed telephony business.

We will undergo a requirements analysis to understand and propose:

  • Business Requirements/Key Management
  • Budget Resources
  • Technical & Security Requirements
  • Project Management, Implementation, Testing & Documentation
  • Monitor, manage and remediate the Network and Vendor
  • Conduct workshops, design options and establish

Software-defined wide-area networking (SD-WAN) is an automated, programmatic approach to managing enterprise network connectivity and circuit costs. It extends software-defined networking (SDN) into an application that businesses can use to quickly create a smart hybrid WAN. SD-WAN enables you to cost-efficiently manage applications, particularly in the cloud. Traffic is automatically and dynamically forwarded across the most appropriate and efficient WAN path based on network conditions, application traffic security and quality-of-service (QoS) requirements, and circuit cost. You can set the routing policies.

Case Studies

GLOBAL FINANCE
FURNITURE RE-MANUFACTURER
AUTOMOTIVE FINANCING
Cloud Migration, Azure, Office365 Sharepoint  Online, Project Management, Firewall Upgrade, Anti-virus Upgrade, Expanded IT capacity

The Client

Our client is a global finance company providing business finance and commercial real estate finance. With Headquarters in Europe and main branches in the United Kingdom, Asia, and the United States, they also operate with smaller sales offices across the globe.

What Problems were they facing?

As a heavy IT lift, our client faced a litany of IT obstacles.

  • Both the Headquarters and each of the branch offices were using disparate IT systems across all locations which created significant data communication issues.
  • The incumbent IT provider would not provide support outside their regular business hours leaving short windows for other branches to resolve technology issues.
  • Utilizing on-premises servers, they experienced significant business disruption.
  • As a Bank, they were also cloud-averse in their approach to technology.

How we solved their problems:

Excensure was asked to participate representing the interests of the America’s branches. Our requirement was to work with Microsoft, HQ, UK and Asia to develop a comprehensive architecture to allow all functions of the bank to work from Azure cloud. We were also requested to provide senior project management on behalf of the bank. Excensure’s contributions included:

  • Architecting an elegant cloud solution which addressed concerns about migrating to cloud applications.
  • Transitioning from on-prem Exchange to Office365 Exchange Online File Server
    • Integrated Office365 SharePoint and One Drive into this solution
  • Migrating from SharePoint Servers to Office365 SharePoint Online
  • Moving phone systems from Skype for Business Servers to Office365 Teams
  • Replacing Unified Device Management (for Blackberry) servers to Intune
  • Replacing Anti-Virus software from Trend Micro to Microsoft Defender
  • Upgrading Checkpoint, Cisco ASA (VPN) Firewalls to FortiGate and Cisco Firepower
  • Providing Server Infrastructure and Azure backup
  • Providing Senior Project Management, while working closely with Microsoft subject matter experts and delivering the project on time
  • Providing Managed Services to the Americas. Outasking to Excensure many IT maintenance, management and reporting tasks allowing the banks internal IT Team to focus on their primary tasks.
  • Participating in Bank Govenance requirements

Summary

In addition to stabilizing and improving data communication between branches, we provided a more secure and stable Technology Infrastructure. We eliminated the dependency of their technology on a physical location. We freed up their internal IT teams to focus on other priorities. In short, we delivered a more secure and cohesive IT ecosystem which meets industry compliance and governance standards meeting or exceeding U.S. and International requirements

System Engineering, Stabilize Core Network, Ecosystem Baseline

The Client

Our client is a furniture re-manufacturer. They source used furniture, and warehouse, repair, and renovate furniture products, for resale. They operate a remanufacturing facility and several warehouse locations as well.  As a growth-minded enterprise, they were looking to remediate the issues they were facing and also build a baseline for the new facilities they would acquire moving forward.

What IT Problems were they facing?

Operating multiple locations and varying work environments. Our client struggled to reach peak infrastructure performance. They were also struggling through several network infrastructure issues including:

  • Non-standardized networks
  • Poor internet connectivity for wi-fi inventory devices
  • Instability of “Patch-work” Network

How did we solve their problems:

A re-engineering of their network infrastructure was required to solve the frustrations they were facing. We re-architected their infrastructure and engineered the baseline for the additional facilities they would acquire in the future.

  • Engineered POE system to simplify installation of devices.
  • Replaced firewall
  • Installed Wi-fi 5 and Access Points
  • Utilized POE Switches
  • Migrated from Wi-Fi scanners to cellular devices

Summary

In addition to resolving the primary issue of signal connectivity for their handheld inventory scanners, we provided system-wide stability to their technology ecosystem. We also provided materials and software baselines for expansion into new facilities.

 

Cyber attack recovery, Network Security, Forensic Analysis Data Recovery

The Client

Our client provides financial services to the automotive industry. Following a Crypto event (Ransomware Attack), they were looking for help recovering data and hardening their network against any other attack.

What problems were they facing?

On the heels of their Ransomware attack, they were facing multiple issues which made them an easier target for additional attacks.

  • Previous management did not understand how to properly protect the network against attack.
  • New management was just discovering the extremely poor condition of the network infrastructure and previous neglectful IT practices
  • Failed Firewalls
    • Both firewalls had been paid for but were never transferred to the client from the previous vendor
  • Health of the network was unknown to the Director of IT
  • Technology in place that was not connected:
    • New Mgt discovered they had paid for 1GB ATT Fiber for three years without it being connected

How did we solve their problems:

  • Facilitated the recovery of their data
  • Managed forensic analysis of the crypto event
  • Transitioned all systems to the Azure cloud and assisted them in moving their applications to vendor cloud based solutions, where appropriate
  • Provided an on-premises backup
  • Deployed Huntress and RocketCyber for threat detection and remediation
  • Bolstered other threat detection systems
  • Provided baseline cyber attack dashboard

Summary

We provided the forensic analysis to determine the source of the attack. We helped them recover their stolen data. We hardened their defenses against additional attacks and monitor their security 24x7.

Our preferred technologies today

Please Complete to Access Pricing

[forminator_form id="837"]