top of page

Chinese New Year Security
Bundle Promotions*

*Valid until 15 March 2021

Want to boost your Company's Security Policy this New Year's?

If you must know anything about Chinese New Year, it is that Chinese people believe and observe many traditions that have passed through generations and generations of people. And it usually starts off with these two – (1) Cleaning up; and (2) Purchasing new items.

Cleaning up is a long-observed Chinese New Year tradition. This is because in Chinese, “dust” is a homophone for the word “chen”, meaning the old. Therefore a year-end cleaning is needed to drive the old things or the bad luck away from the house, and get ready for a new start.

And since this is a year anew, they should buy a lot of new things. This is because purchasing new items symbolizes welcoming new things and getting ready for a new start.

At eVantage Technology, we want to help your company ‘spring clean’ for the New Year as well. We aim to provide your company with the Security services and solutions that your company needs right now, and assure you that these services and solutions will be made readily available to you and your company. Hence, we will do this by:

  1. Reviewing and cleaning up your old Security Policies and Setups

  2. Conducting a Vulnerability Assessment and Penetration Test to get rid of any unwanted “dust”

  3. Hardening, establishing and boosting your Company’s Security Policies and Setups through the adoption of new Security Services if necessary

We have thus curated 3 Special Bundle Promotions exclusively for you this Chinese New Year!

Chinese New Year Security Services Bundle Promotions

#1: Security

FREE 3 MONTH

Managed Firewall

Managed Email Security

Managed Threat Analysis

+ Phishing

*Get 3 months of our Managed Cyber Security Awareness Training Program and 1 Phishing Simulation for FREE when you sign up for our Bundle Promotion #1, featuring our Managed Security Services. It includes Managed Firewall, Managed Email Security, and Managed Threat Analysis.

This bundle promotion is only applicable upon successful subscription by 15 March 2021. Minimum 1 year contract. Does not include any security services currently subscribed with us.

 

*Indicate your interest with us and get a 30 minutes FREE virtual IT Security and Services Consultation with Certified Experts!

Offers

#2: Backups

FREE Vulnerability Assessment

Daily Backup (for Servers)

Daily Backup Monitoring

Disaster Recovery Plan

+ Free Consult

*Get 1 FREE Internal Vulnerability Assessment (VA) for up to 50 IPs (devices) when you sign up for our Bundle Promotion #2, featuring our Managed Backup Services for Servers. It includes Daily Backup (for Servers), Daily Backup Monitoring, and Disaster Recovery Plan.

This bundle promotion is only applicable upon successful subscription by 15 March 2021. Minimum 1 year contract. Does not include any security services currently subscribed with us.

*Indicate your interest with us and get a 30 minutes FREE virtual IT Security and Services Consultation with Certified Experts!

#3: Training

FREE VA & Phishing Simulation

Managed Cyber Security Awareness Training (Security Health Checker, Interactive Training Videos, Cyber Security Poster)

Customised with Company Logo

Real Life Phishing Campaigns

+ Free Consult

*Get a FREE Cyber Health Check with 1 FREE consultation session when you sign up for our Bundle Promotion #3, featuring our Managed Cyber Security Awareness Training. It includes Managed Cyber Security Awareness Training (Security Health Checker, Interactive Training Videos, Cyber Security Posters), Customised with Company Logo, and Real Life Phishing Campaigns.

This bundle promotion is only applicable upon successful subscription by 15 March 2021. Minimum 1 year contract. Does not include any security services currently subscribed with us.

*Indicate your interest with us and get a 30 minutes FREE virtual IT Security and Services Consultation with Certified Experts!

I am Interested!

Form

Want to find out more about our Security Services?

About our Managed Security Services

Our Managed Security Services is a subscription-based security services includes outsourced monitoring and management of client’s security system and devices.

Fully Managed Services

Fully Managed Security Services is an option where eVantage owns the security technologies and manages and monitors the security events including the critical hardware components such as Firewall, IDS, Wireless routers etc.

Partially-Managed Services

Partially-Managed Services has the option of hybrid/partially own the security technologies if the client has already purchased or owns the security

eVT-Managed-Security-Services-1-768x476.png
Service

About our Security Services

Cloud Security

Protect data stored online/cloud infrastructure such as AWS, Azure, Enterprise File Sharing Solution

Compliance Management

eVantage offers a various range of security compliance programs such as PCI Compliance; HIPAA Compliance, Risk Assessment

Cyber Security Training

Engaging and relevant security awareness training; Access to policies and procedures toolkit; Spear phishing campaigns

Email Security

Phishing and Spear Fishing Protection; Anti-Spam and Attachment filtering; Malware and Ransomware protection; Email Continuity; Detailed Dashboard and Statistics; Multi Factor Authentication (MFA)

Encryption

Encryption for end user devices, emails, operating systems, servers, networks and cloud services; Industry-Leading 256-bit AES Encryption Algorithm

Infrastructure Hardening

Security Hardening in the on-premise servers, network devices such as firewalls, switches, AP etc.; Redesigning of Infrastructure; Creation of Network and IT Infrastructure Diagrams

Mobile Device Management

Management of User Permissions and Restrictions; User Activity Logs; Enhanced Mobile Security; VPN Compatibility; Remote Management of Applications and Data

Network Security Services

Real-time network, monitoring and endpoint protection, data collection and classification; Detailed Reporting; Detection of Disturbance Activity; Utilises context-aware machine learning model and algorithms

Office 365 Email Audit

Managing security related alerts in Office 365 Cloud App Security, Data Governance; Monitor User and Administration Permissions; Data Governance; Access to Reports

Security Auditing

All-in-One Security Specialist, ranging from email to network to cloud; Detailed Audit Reports; Digital Forensics, Incident Response, Telecom Security

Security Consultant

Assess threats, computer system and networks for vulnerabilities, design and implement the best security solution with affordable cost; Provide Managed Security Services

Vulnerability Assessment

Financial Fraud Risk Management, SCADA Security, Web Application Security, Security Audit, Penetration Testing

About our Cyber Security Awareness Training Program

Our Cyber Security Awareness Training Program enhances company’s cyber security by delivering an effective cyber security awareness program to your staff, offering a complete solution to test, train, measure and mitigate human risk.

Online Awareness Program

Each month you will receive an email with access details to complete a short online awareness program. These must be completed within 7 days of the due date. Although we maintain controls to help protect our networks and computers from cyber threats, we rely on the end users to be our first line of defense.

Simulated Phishing Attack

You will receive a simulated phishing attack from time to time. 'Phishing' is the most common type of cyber-attack that affects organizations like ours. Phishing attacks can take many forms, but they all share a common goal of getting you to share sensitive information such as login credentials, credit card information, or bank account details. The goal of our phishing simulation is to provide you with a safe, simulated environment where you can experience what a real phishing attack looks like. If you happen to click a simulated link, you will be automatically enrolled in the phishing security training.

Reporting

A Behavioral Analytics to identify Engagement and risks and a detailed reporting of results would be done by our Security Team.

Security
CSAT

About our Internal Vulnerability Assessment

Our Internal Vulnerability Assessment is done to identify, quantify and prioritize the weaknesses in a system.

A Full Scan vulnerability assessment would be done in either for the Internal Network IP’s or a website and a complete reporting would be created. Report with each weakness will have its own remedies.

About our Compliance Management

Our Compliance Management Service comprises of:

Risk Assessment

PCI Compliance

HIPAA Compliance

Compliance
VA
  • What is the difference between an Internal and External Test?
    An Internal Test means that our tester will be onsite, simulating an internal breach by someone in your office. For example, our tester will simulate a hack into your company’s servers from within your network – either over WiFi or plugged into your network. An External Test means that our tester will try to hack into your company’s system from outside your network or anywhere in the world. For example, our tester will simulate a hack into your company’s website from a Starbucks or even from Indonesia.
  • What is the difference between VA and PT?
    Vulnerability Assessment (VA) is an assessment that will only assess the vulnerabilities in your environment without testing for confirmation. It is basically a non-intrusive assessment. For example, when you see a GP doctor for a Knee Pain, a general assessment will be provided and the doctor will then advise you to rest, apply some cream, and monitor. Penetration Testing (PT) includes VA, but with the additional testing for confirmation. This means that the assessment will comprise of both the assessment for vulnerabilities in your environment, as well as testing to provide proof of breach. For example, after seeing a knee specialist for the bad knee, the doctor will assess it, before conducting some tests to simulate the pain in order to confirm the right prognosis, and apply the most suitable and effective follow-up treatment.
  • What is the deliverable of the tests?
    2 reports will be provided for both VA and PT – one after each round of testing.
  • What is the process for testing?
    There will be 2 rounds of testing. 1st Round of Testing – by eVantage Technology Based on the Client’s requirements, the 1st test will be conducted. A report, which includes the current vulnerabilities, proof of breaches (where available), and recommendation to address the risks found, will be provided to the Client. Rectification Work – by Client The Client is then tasked to follow the recommendations provided in the report to secure its environment before a 2nd test will be conducted. 2nd Round of Testing – by eVantage Technology After the rectification done by the Client, a 2nd test will then be conducted to ensure the environment has been successfully secured. After the 2nd test, a second report, which includes the current vulnerabilities, proof of breaches (if any), and recommendation to address the risks found (if any), will be provided to the Client. However, do take note that there should not be any vulnerabilities found in the 2nd test if the client chooses to follow the recommendations provided in the first report and effectively secures its environment.
  • How long will the entire process take on average?
    The length and duration of the entire VAPT process will depend on the scope of test and the time required by the Client for rectification work. Hence, it is important for the Client to provide us with a rough projected timeline when filling in the form above, in order to minimize any potential delays in entire process.

Our Latest Security Stories

Let's Work Together

Get In Touch with us today so that we can help you fulfill your business' IT needs.

Our IT Services

Cloud Solutions

Cloud Solutions.png
Find Out More >

IT Project Mgmt

IT Project Management.png
Find Out More >

IT Security

IT Security.png
Find Out More >

IT Support

IT Support Services.png
Find Out More >

Office Fit Out

Office Fit Out.png
Find Out More >

Telephony

Telephony.png
Find Out More >

Smart Hands

Find Out More >

Our Partners & Products

Our IT Services

Cloud Solutions

Cloud Solutions.png

IT Project Mgmt

IT Project Management.png

IT Security

IT Security.png

IT Support

IT Support Services.png

Office Fit Out

Office Fit Out.png

Smart Hands

Our IT Solutions

BCD.png

Business Continuity Disaster Recovery

Public Safety.png

Business Continuity Disaster Recovery

Cola.png

Collaboration

DP.png

Data Protection and Recovery

DaaaaS.png

Desktop as a Service (DaaS)

Endpoint.png

Endpoint Monitoring and Management

Enterprise.png

Enterprise File Sync & Share

Infrastructure.png

Infrastructure Design and Deployment

Managed Security.png

Managed Security

Office pro.png

Office Productivity

Virtual.png

Virtualization

Our Partners & Products

Our FREE Resources

Design-Room-10-3.png

FREE Managed Cyber Security Trial

Design-Room-21.png

FREE Vulnerability Assessment & Penetration Testing Quote

Design-Room-23.png

FREE Enterprise File Sync & Share Trial

Design-Room-24.png

FREE IT Relocastion Checklist