PULSOC SME Guardian Pack

Complete business protection for small and medium enterprises

Cyber attacks are becoming increasingly sophisticated and difficult to detect every day, and the business data and reputation of large systems are no longer the only targets of attackers – as much as 43% of cyber attacks per year are directed at small and medium-sized enterprises.

Due to a lack of resources and personnel, insufficient information and inadequate security expertise, businesses called small and medium-sized enterprises (SMEs) are becoming increasingly frequent targets of cybercriminals.

That’s why we’ve created the SME Guardian Pack – a two-part set of services tailored to the needs and capabilities of small and medium-sized businesses.

The SME Guardian Pack consists of two services: 

1. Smart Protect for device and data protection, and
2. ReStore for secure data storage and backup.

Small and medium-sized businesses interested in protecting their operations can contract one or both of these services within the SME Guardian Pack.

You can learn more about individual services and their packages in the following sections.


Smart Protect

Protect your devices and data from advanced cyber threats.

Smart Protect includes services and tools that effectively prepare your infrastructure and protect your data and devices.

This includes the following steps and elements:

  • Device and data protection;
  • 24/7 monitoring by the PULSOC team;
  • Anti-ransomware tools;
  • Onboarding – preparing your infrastructure for the
    implementation of advanced cybersecurity solutions.

You can contract Smart Protect in one of three selected packages – Basic, Standard, or Advanced. You can learn more about them in the following sections.

Charged monthly by number of users

SMART PROTECT BASIC

  • Endpoint device protection
    Endpoint device protectionProtection of all devices such as workstations and servers from cyber attacks. The protection process relies on comprehensive technological solutions for detecting, examining, and eliminating threats.
  • Mobile device protection
    Mobile device protectionProtection of mobile devices from malicious activities (software) that can lead to unauthorized access by third parties and unauthorized data acquisition.

Charged monthly by number of users

SMART PROTECT STANDARD

  • Endpoint device protection
    Endpoint device protectionProtection of all devices such as workstations and servers from cyber attacks. The protection process relies on comprehensive technological solutions for detecting, examining, and eliminating threats.
  • Mobile device protection
    Mobile device protectionProtection of mobile devices from malicious activities (software) that can lead to unauthorized access by third parties and unauthorized data acquisition.
  • Email protection
    Email protection Protect your email account from malicious threats, spam emails, and phishing attacks, as email can be easily misused.
  • Cloud application protection
    Cloud application protection Protection of confidential information and resources used by companies that use cloud services.

Charged monthly by number of users

SMART PROTECT ADVANCED

  • Endpoint device protection
    Endpoint device protectionProtection of all devices such as workstations and servers from cyber attacks. The protection process relies on comprehensive technological solutions for detecting, examining, and eliminating threats.
  • Mobile device protection
    Mobile device protectionProtection of mobile devices from malicious activities (software) that can lead to unauthorized access by third parties and unauthorized data acquisition.
  • Email protection
    Email protection Protect your email account from malicious threats, spam emails, and phishing attacks, as email can be easily misused.
  • Cloud application protection
    Cloud application protection Protection of confidential information and resources used by companies that use cloud services.
  • Secure application access
    Secure application access Enabling secure access to authorized personnel.

ReStore

Provide enough storage space for data and secure access in case of physical damage or cyber attacks.

ReStore is a set of services that will ensure not only data storage, but also their recovery in case of physical damage or cyber attack. This includes:

  • Secure cloud platform for data storage;
  • Expandable storage space (scalable as needed);
  • Data recovery after an incident (device theft or loss, ransomware attack);
  • Onboarding – preparation of your infrastructure for data backup.

ReStore can be contracted in one of three selected packages – Starter, Personal, or Business. Learn more about them below.

Charged monthly by number of agents

ReSTORE STARTER

  • One workstation
    One workstationBackup of data from one device (desktop computer, laptop).
  • Storage space – 30GB
    Storage space – 30GB30 GB storage space. Charged per agent.

Charged monthly by number of agents

ReSTORE PERSONAL

  • One workstation
    One workstationBackup of data from one device (desktop computer, laptop).
  • One mobile device
    One mobile deviceBackup of data from one device (desktop computer, laptop) and one mobile device.
  • Storage space – 30GB
    Storage space – 30GB30 GB storage space. Charged per agent.

Charged monthly based on data amount

ReSTORE BUSINESS

  • Workstations
    UnlimitedUnlimited backup for an unlimited number of workstations
  • Mobile devices
    UnlimitedUnlimited backup for an unlimited number of mobile devices.
  • Servers
    UnlimitedUnlimited backup for an unlimited number of servers.
  • Virtual machines
    UnlimitedUnlimited backup for an unlimited number of virtual machines.
  • Office 365
    Unlimited Unlimited backup for an unlimited number of accounts.
  • G Suite
    Unlimited Unlimited backup for an unlimited number of accounts.
  • Storage space – 1TB
    Storage space – 1TB The storage space included in the package is 1TB. Payment is per agent.

How can we assist you?

Send an inquiry for a ReStore or Smart Protect package tailored to the needs of your business

Fields marked with an asterisk (*) are required.