Secure Network

Managed Anti-Virus

Keeping your business protected requires more than just off-the-shelf software. Stealth’s anti-virus solution delivers enterprise class protection, and is monitored 24/7 by our Network Operations Center, keeping your business secure while saving you money.

  •     Provides proactive and comprehensive security, monitoring, and management
  •     Centralizes the deployment and updating of software to ensure coverage and consistency
  •     Automates management processes to avoid errors and reduce costs
  •     Leverages expert IT skills

Stealth features solutions from Gears and BitDefender.

Firewall Services

Stealth provides managed firewall services to protect your business.

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Network traffic must be monitored continuously to identify and respond to threats before damage is done.

Stealth firewall services provides 24×7 firewall administration, log monitoring, and response to security and device health events. By relying on Stealth, you are able to reduce the cost of managing and monitoring firewalls in-house, while supplementing your security efforts with Stealth’s proven expertise.

Our firewall management service helps you more easily fill compliance gaps requiring perimeter security, access control, and log analysis. With our experts managing and monitoring your firewalls, you can satisfy compliance requirements of PCI, HIPAA, ISO and other standards. Stealth Firewall Services allows businesses to:

  • Protect systems and servers 24 x 7
  • Optimize firewall performance
  • Remove management and monitoring burden
  • Support compliance initiatives

Stealth provides physical and software based firewall solutions.


Disaster Recovery

Stealth provides a suite of solutions enabling your company  to maintain business operations by protecting it from the effects of significant negative events. Significant negative events can include anything that puts an organization’s operations at risk: crippling cyberattacks and equipment failures, for example, as well as hurricanes, earthquakes, and other natural disasters.

Data Backup

Stealth Data Backup is a cost-effective data protection solution for protecting physical, virtual, and SaaS environments. The Stealth expert team reviews corporate requirements and then deploys a customized scalable retention and offsite disaster recovery to the Stealth data centre.  

  • Perform local & cloud backup manually or on a scheduled basis
  • Back up everything—disks, partitions, servers, data—to the Stealth data centre
  • Recover anything quickly and easily—files, folders, applications, or an entire system
  • Keep backups safe in Stealth’s ultra-secure Tier-IV designed & SSAE-16 compliant local datacenters

Email Backup

Retain and retrieve all email communication while reducing storage requirements.

Stealth’s Email Backup Service is ideal for organizations looking to reduce their email storage requirements and boost user productivity with mobile or desktop access to any email ever sent or received. The Stealth Email Backup service provides as powerful platform for disaster recovery and compliance.

Website Backup

Stealth’s Website Backup service protects your company in situations where the integrity of your website has be compromised. When a website is hacked, vandalized, or deleted, Stealth will quickly have the website restored, minimizing any financial or reputation loss.

Email Relay

Stealth’s Email Relay service protects all incoming email communications in situations where  your company’s onsite email server fails. Email Relay will store and retrieve  all emails when the onsite server has been repaired. This service ensures that a business will never lose an important piece of communication.

Managed Pentesting Services

There are a lot of different ways that penetration testing is described, conducted and marketed.  Often confused with conducting a “vulnerability scan”, “compliance audit” or “security assessment”, penetration testing stands apart from these efforts in a few critical ways

A penetration test is designed to answer the question: “What is the real-world effectiveness of my existing security controls against an active, human, skilled attacker?” We can contrast this with security or compliance audits that check for the existence of required controls and their correct configurations, by establishing a simple scenario:  Even a 100% compliant organization may still be vulnerable in the real world against a skilled human threat agent.

A penetration test allows for multiple attack vectors to be explored against the same target. Often it is the combination of information or vulnerabilities across different systems that will lead to a successful compromise. While there are examples of penetration testing that limit their scope to only one target via one vector (example, a web application pen test conducted only from the point of view of the Internet browser), their results should always be taken with a grain of salt:  while the test may have provided valuable results, its results are only useful within the same context the test was conducted. Put another way, limiting scope and vector yields limited real-world understanding of security risk.


Here are a few of the reasons organizations invest in penetration testing:

  • Determining the feasibility of a particular set of attack vectors
  • Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence
  • Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software
  • Assessing the magnitude of potential business and operational impacts of successful attacks
  • Testing the ability of network defenders to successfully detect and respond to the attacks
  • Providing evidence to support increased investments in security personnel and technology to C-level management, investors, and customers
  • Meeting compliance  (for example: the Payment Card Industry Data Security Standard (PCI DSS) requires both annual and ongoing penetration testing (after any system changes)
  • Post security incident, an organization needs to determine the vectors that were used to gain access to a compromised system (or entire network). Combined with forensic analysis, a penetration test is often used to re-create the attack chain, or else to validate that new security controls put in place will thwart a similar attack in the future.


What can you expect? A detailed description and proof of concept for each Vulnerability finding, as well as an Solution driven Remediation plan. And because we understand that risk severity is only one factor in prioritizing remediation efforts, we’ll also provide insight into the level of effort needed to remediate the findings. In addition, you’ll receive:

  • An attack storyboard that walks you through sophisticated chained attacks
  • Scorecards that compare your environment with best practices from an attacker’s perspective
  • Positive findings that call out what security controls you have that are effective
  • Removal of the Hidden Vulnerabilities and malicious Malware that most Vulnerability scanners cant detect
  • A detailed layout Plan of your Organizations Network structure and roadmap of where to patch your Network to isolate and Prevent incidents and Future  intrusions and breaches

Cyber Monitoring Services

We off In-depth detailed analysis of every endpoint event and can detect attackers across the kill chain. The average endpoint on your network generates 150,000 events every day. Our Cyber SOC engineers analyzes every event against numerous types of detection technologies to identify threats at each stage of the kill chain, from installation through action on objections.

Our Cyber SOC security team brings together endpoint analysts, incident responders, forensics experts, and security engineers. They understand what normal endpoint activity should look like, when a more thorough investigation is required, and when to raise the alarm.

  • CSOC Detects and Identifies unauthorized access to hidden or administrative shares Access to hidden-but-present shares intended for use by systems administrators commonly leveraged for lateral movement.
  • Specific threat actor campaigns and/or TTP Patterns of behavior and movement associated with specific actors and/or used to achieve specific objectives.
  • Privilege escalation Use of malware or native operating system utilities to escalate from user-space to superuser privileges. Used to gain access to resources not available upon arrival
  • Network connections to known bad domains and IPs Use of comprehensive threat intelligence to identify known bad artifacts within network connection metadata.
  • Misuse of host OS utilities Includes use of command shells, remote access and automation utilities for illicit purposes and potentially via stolen credentials. Very frequently used for lateral movement and other action, and traditionally very difficult to detect.
  • Exploitation of known vulnerabilities Behaviors specific to exploitation of vulnerable software or vulnerable operating system configurations.
  • Execution of un-trusted binary Binary files that are new to an environment and for which no reputation information is available. Infrequency and uniqueness are common indicators of suspicious or malicious activity