CYBERSECURITY
Everything You Need To Know About
User
Users are the weakest link when it comes to security . Kaseya 365 User , announced at DattoCon , aims to solve that pain point for MSPs and their clients — for an extremely low price of around $ 2.69 per user .
Like its predecessor Kaseya 365 Endpoint , which Kaseya announced in April , Kaseya 365 User is an all-in-one subscription . It includes all the components an MSP needs to secure users and back up their SaaS data , plus hundreds of automations to increase efficiency . And it represents the second phase of Kaseya ’ s goal to change the unit economics for MSPs .
A Look At The Kaseya 365 User Components
To protect users across all their work activities and interactions , Kaseya 365 User bundles five solutions :
• Phishing Defense ( Graphus )
• Cloud Detection and Response ( SaaS Alerts )
• Security Awareness Training ( BullPhish ID )
• Credential Monitoring ( Dark Web ID )
• SaaS Backup ( Spanning or Backupify )
Ranjan Singh , Kaseya chief product officer , explains that protecting today ’ s user requires all the components of Kaseya 365 User .
1 . Protect The User Against Phishing Emails
“ Email is the number one threat vector ,” Singh says , so the first step in protecting the user is phishing defense .
Kaseya ’ s automated email security platform helps MSPs protect every end user ’ s inbox from email-borne attacks and fraud . The patented AI technology stops ransomware , business email compromise ( BEC ), account takeover ( ATO ), and other dangerous cyberattacks . It automatically quarantines malicious emails , warns recipients of suspicious emails via dynamic banners , and allows recipients to report questionable emails .
The AI engine behind the scenes analyzes recipients ’ business relationships , scans for irregularities in messaging and attachments , and continues to learn from user interaction and feedback .
2 . Protect Where The User Is Going
The number of SaaS applications that employees use on a daily basis is increasing significantly , both authorized and unauthorized . Cloud detection and response ( CDR ) technology continuously monitors user activity , provides real-time threat detection , and automatically remediates security issues .
8 | MSPSUCCESS . COM