JMS Secure Data Full services brochure

Page 1

Cloud Storage Data Centre Backup Encryption Software IT Support Services A fully comprehensive guide about our services.

All in one!

Packages from


Cloud Solutions & Data Centre Backup Why a File Sync & Sharing Solution is Critical for Your Business? Support for Multiple Devices

When you need to share content fast, you don’t want to be constrained by the device type you can use. Select a solution that supports all the devices your employees use so that they are never restricted.

Smart Sync Capabilities

Choose a solution that has the ability to replicate desktop file structures on a folder or sub-folder basis. This ensures access to all-important documents while on the road.

On and Offline Access

Assure that synced content is fully accessible when the device is out-of-network or offline. This includes being able to manipulate documents (e.g., edit, share, etc.) and not simply view them while offline.

Version Control

A business-grade file sharing service should have built-in file versioning. This eliminates risks of losing important files or changes. With versioning, files can be instantly recovered, viewed, and restored to their original location, either one file at a time or the entire folder. Look for a service with the option to request custom versioning limits that extend beyond 6 months as versions should be stored for at least 6 months.

Built-in Remote Wipe Capabilities

Ideal for environments where remote workers or consultants are given content access, built-in remote wipe capabilities that will delete content from selected devices when desired & can safeguard content from getting into the wrong hands. This is also ideal to minimise risk in the event of device theft or loss.

Two-factor Authentication

For secure document access, assure that two-factor authentication protection is in place. It’s important for you to know who is accessing information and where they’re coming from.

Share Content with Links

Eliminate the need to email files, and improve security with link sharing. Look for a solution with an array of customisation options for public sharing including password protection, view or download permission, as well as auto-expire after a time period or access count.

Real-time, Multi-Platform Sync

The beauty of the cloud is that your entire team can stay in sync. Arguably one of the most crucial components of a powerful file sharing solution is reliable and functional sync. Look for a solution that supports both Mac and Windows, as well as file servers. Always having access to the right content, whether online or off, improves team productivity and drives the business forward.

Secure Sharing without Forced Registration

No File Size Limit

Encryption In-session, In-transit, On-device

Continuous Real-time Backup

For the best flexibility, select a solution that doesn’t force recipients to adopt the same file sharing service as the person sending the document.

To protect your organisation’s data, select a file sharing solution that delivers 256bit AES encryption for every point in your content’s lifecycle – when it’s being accessed in-session, while in-transit and while at rest, regardless of where it’s being stored or what device it’s on. Also be sure that unique and rotating encryption keys are used for each file.

A file sharing solution shouldn’t make you change how you work. Large presentations and graphic files need to be sent and synced seamlessly. Look for a solution with no file size limitations for syncing and backup.

Businesses must be prepared for computer crashes, loss or theft, and scheduled or manual backups are not sufficient. Look for a solution that provides backup of critical files and folders in the cloud for redundancy and restoration in the event of file loss or data corruption. Backup should operate continuously in the background, typically discovering modified files within seconds, and then initiating backup.

Powered by Autotask Workplace

Cloud-enable Your File Server

Company employees, virtual teams and authorised parties can securely access the files they need, when and where they need them, and changes are automatically synced across the appropriate user devices and company file servers without intervention. As a result, everyone – including mobile workers and remote offices – has access to the most current versions of files, which are securely protected, retained and archived with greater efficiency and recoverability.

Autotask Workplace is a complete, secure file sharing and collaboration solution that enables your team members to safely access, manage, organise and share files from any device, anywhere.

It enables productivity by allowing individuals or teams to work on any documents or digital content – from their device – in real time, without fear of security breaches. Autotask Workplace also gives employees built-in security controls that can be set up based on how they need to share information with team members.

Mobile Productivity Content Privacy and Security Collaboration Features

Any secure, built for business File Synchronisation and Sharing solution should include the following characteristics. When evaluating file sync and sharing solution providers, utilise this checklist to ensure the solution you select can do the job. Mobile Productivity

Content Privacy & Security

Support for Multiple Devices

Encryption In-session, In-transit,


Policy-based Control of Content,

Collaboration & Editing Smart Sync Capabilities On and Offline Access Version Control

On-device Users & Devices Download / Copy Prevent; Auto PDF Built-in Remote Wipe Capabilities Two-factor Authentication

Secure Sharing without Forced Registration

Share Content with Links

Scan to PDF for Instant Field Image and Document Capture

Inactivity Session Timers

Automated Document QR Coding

IP Address White Listing

Team Collaboration Systems Integration

Real-time, Multi-Platform Sync No File Size Limit Continuous Real-time Backup Cloud-enable Your File Server Flexible Permissions

Integrated Editing Universal File Support

Encryption Software Our fully managed service provides an easy and convenient way to protect all information stored on your organisation’s computers. Everything you need in a single service.


The dramatic proliferation of desktops & laptops means your mobile workforce exposes a huge amount of company data outside the secure perimeter of the office each day. Your confidential plans, privileged customer information, and other sensitive data are easily accessed through lost or stolen computers. There is also increased media coverage of data breaches that can damage your corporate reputation and strong privacy regulations, around the world, that open the door for fines, lawsuits, and criminal penalties. You need a simple, enforceable solution that will completely protect your company’s data wherever it goes.


Check Point Full Disk Encryption™ delivers robust data protection for endpoint laptops and PCs. A combination of strong encryption with access control exceeds the highest level of the strictest certifications. Centralised management simplifies deployment to Windows, Mac, and Linux endpoint machines, translating into quick and complete protection at the lowest total cost of ownership.


Based on market-leading Pointsec® technologies, Check Point Endpoint Security Full Disk Encryption™ is proven in business and government agencies, of all sizes, around the world, providing the highest level of data security through strong encryption for both PCs and laptops. Check Point Full Disk Encryption is just one of the multi-platform solutions that Check Point offers that also cover handheld wireless devices and portable storage media. Check Point Full Disk Encryption easily works with Windows, Mac, and Linuxbased systems and operates transparently to the user. It also ties in seamlessly with all IT environments. Regardless of whether an enterprise uses smartcards or tokens, requires Single Sign-On, or Windows Integrated Login (WIL), Check Point Full Disk Encryption can be configured to meet the organisation’s specific needs.



Check Point Full Disk Encryption provides the highest level of security by combining preboot authentication with full-disk encryption and the ability to support all common smartcards and tokens. The Check Point Full Disk Encryption application’s preboot launch protects the OS from all known attack methods. Only authorised users with the correct logon and password can gain access to the computer. If the machine is turned off or goes into standby mode, the entire hard drive remains encrypted protecting all the contents. These claims are further validated by the most and highest level of certifications in the industry, including FIPS 140-2, GDPR and BITS.

Set-and-forget full-disk encryption with preboot authentication

Central policy management, key recovery, and remote help

Automatic and transparent operation to end users

Strong authentication and Single Sign-On options

GDPR , FIPS 140-2, and other key certifications


Mitigates data breach exposure from lost or stolen PCs or laptops

Deploys quickly to meet compliance objectives and conserve resources

Scales to meet the needs of any size enterprise, business, or government agency

Maintains high end-user productivity and IT control

Offers compliance with strict privacy legislation and regional laws

Powered by Alertsec / Check Point

Check Point Endpoint Security Full Disk Encryption Protecting data where it’s most vulnerable

Why you need computer security

Most users store company information on their corporate desktops & laptops. If the desktop or laptop is lost, stolen or compromised by web-based threats, there is a risk that the proprietary information can be stolen from the desktop or laptop used to penetrate corporate networks and databases. A data breach can damage your reputation and result in fines, lawsuits and lost revenue.

Total Endpoint Security

By using Alertsec Total Endpoint Security you ensure that all your organisation’s data is protected. With our service you can encrypt your desktops & laptops and USB sticks, detect and remove malware, protect computers from web-based threats and block unwanted traffic. There is no need to invest in multiple products, hardware or training - we handle everything for a fixed, monthly subscription.

Easy to manage

Web-based management and predefined best practice policies reduce the administration overhead to a minimum. Log in to your web account to manage all users and software applications.

Compliance and reporting

You are able to continuously monitor the security status of all your computers relative to your deployed policy, providing the information you need is compliant with GDPR requirements.

Comprehensive 24/7 support

The JMS Secure Data / Alertsec helpdesk is always open for all users. Call or email us from anywhere, anytime. Our experienced engineers are standing by to assist all your users.

Powered by Check Point

Our software is powered by Check Point Endpoint Security products, which are positioned in the leader's quadrant in Gartner's Magic Quadrant for Mobile Data Protection. The implemented encryption has the highest security certifications - FIPS, GDPR and BITS.

Available software applications Full Disk Encryption

256-bit Full Disk Encryption to encrypt everything on a desktop & laptop. Only authorised users will be allowed access to the information.

Media Encryption / Port Control

Provides encryption of removable storage media, USB sticks, CDs and DVDs. Port Control enables control of the activity on all computer ports (USB ports etc.) and includes centralised logging of port activity.

Anti-Malware / Program Control

Efficiently detects and removes malware from the computer with a single scan. Program Control assures that only legitimate and approved programs are executed.


Protects against the latest web-based threats including drive-by downloads, phishing sites and zero-day attacks. Browser sessions are run in a secure virtual environment.


Proactive protection for inbound and outbound traffic prevents malware from infecting your computers. The firewall blocks targeted attacks and stops unwanted traffic.

Protect your information now Download a free trial at

Check Point Encryption supports both Windows and Mac.

IT Support Keeping IT Support Simple Our IT Support Services, designed for SME’s, are cost-effective and provide the flexibility of choosing from 3 different packages to suit your organisation’s needs. Our IT Support Team is made up of skilful individuals who have the knowledge and experience of comprehensive IT solutions in the SME market. They have extensive expertise in servicing and repairing all types of hardware and software, including servers, PCs, printers, networking devices, storage devices and peripherals. End User Support

We provide a wider range of IT support services to meet changing business needs. You may want to work with JMS Secure Data as a complete outsource IT department or simply choose us when either you do not feel you have sufficient skill or resource to embark on a particular project. Choosing from a flexible framework, we offer a customised service, giving as much or as little support as your organisation requires. Our IT support services are cost-effective and tailored to your business needs.

Three levels of support •

Fixed price & unlimited support to ensure best value

Qualified Technical Team and Account Manager that understands your Business

Technology Selection Assistance - Procurement Services to help customers update and upgrade their IT Network.

Unlimited support

Our support is unlimited and it comes at a fixed package price in line with your budget so it’s in our interests to make sure potential issues are detected and fixed before they turn into problems. Talk to us about how to outsource your IT department and how we can meet your company’s data and communication needs. We make the service more efficient and cost effective making life simple for you.

This is where JMS Secure Data can help: •

We can arrange cover for the necessary continuation of your business thus managing holiday and sickness cover to minimise disruption to customers.

We provide unlimited telephone, secure remote control and full access to the computer to diagnose, install updates if necessary and remedy the problem as if the consultant is sitting in front of the computer. We deliver comprehensive, support solutions freeing clients from the burden of continuous phone calls to engineers and the hassle of blindly troubleshooting problems.

In Partnership with Hiteishee Technology Services

We deliver remote monitoring of key network devices such as routers, firewalls and servers to receive real time reporting with instant notification when service indicators reach a warning or critical state. This will quickly and effectively diagnose and resolve technical issues.

We cover desktop or laptop users immediately and at any time of day, minimising potential lost productivity and can assist a client’s distributed workforce in an efficient manner, whether they are mobile users, or remote office workers.

If you choose a more upgraded package, a fully qualified network engineer who knows your IT infrastructure will attend on-site within the designated response time chosen, in the event of any system, fault or failure. The aim is to return the user(s) to where they were as quickly as possible so your systems are fully operational and back to working order which may include a complete re-installation of the network operating system and restoration of data.

Qualified Technical Team & Account Manager

Our team of experts will help you find cost effective solutions to integrate seamlessly with your current systems. Using a well developed network of suppliers, we ensure optimum pricing and availability to the latest proven technology. Our staff and competencies allow us to deliver on-time and to the manufacturers standards. Our extensive post sales service adds value to your purchase, improving the longevity and effectiveness of goods purchased.

Technology Selection Assistance – Procurement Services

You can also opt for our Procurement Services which can save you time and money. Our IT support team can help customers update and upgrade their IT network. You can use our procurement services for all types of hardware, software, peripherals or consumables for your printers. We have the expertise to help you find cost effective solutions to integrate seamlessly with your current systems. Using a welldeveloped network of suppliers, we ensure optimum pricing and availability to the latest proven technology, prompt delivery and to the manufacturers standards.

Making life simple for you

At JMS Secure Data, we believe in being proactive. As your IT department, we deploy advanced monitoring systems to monitor, report and maintain your critical servers and workstations on our Gold Package. We also make regular site visits to ensure that everything works smoothly.

The Packages

£33 £48 £75 p/m

Autotask Cloud Workplace Secure Data Storage





















Sync Data Between All Devices Password protect & set expirations for folder & file links Remote File Access from Any Device iOS, Android, BB, Windows Mobile Support IT Support Software Support Service – Telephone & Remote Assistance Server Monitoring Service – Remote Management Server Support Service – Uncapped On-site Assistance End-User Support Service – Uncapped On-site Assistance Technology Selection Assistance - Procurement Services Data Centre Backup Geo-redundant datacentres with RAID6 mirrored backup AES 256-bit encryption for files in transit and at rest Regional Data Centres (EMEA & NA) Encryption Software Full Disk Encryption Media Encryption Port Control Anti-Malware Firewall Programme Control Free 14-Day Trial All prices are per month and exclusive of VAT. All packages are subject to a minimum 12 month contract. *Gold package is only available for businesses located within the London M25 area.

CONTACT US Airport House, Purley Way Croydon CR0 0XZ

Tel: 020 3397 9026 Email: Website:

Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.