Welcome to Our Service Transition FAQ

As we continue to evolve and enhance our offerings at BrightFlow, we understand that changes to our services can bring up questions and considerations for our valued clients. This dedicated FAQ page is here to provide you with clear, concise answers about our transition from offering standalone web services to integrating these services into our comprehensive IT managed services. Our goal is to ensure you have all the information you need to navigate this transition smoothly and confidently. If you have any questions beyond what is covered here, please don’t hesitate to reach out to our dedicated support team.

Why is BrightFlow making this change?

Answer: At BrightFlow, we are always looking for ways to enhance the services we provide. Over time, we’ve observed that the most cohesive, effective, and secure web solutions emerge when they’re integrated with a comprehensive IT strategy. By focusing our web services on our IT managed services clients, we can ensure a seamless experience, better performance, and more personalized support.

How will this affect my current ‘Web Only’ service?

Answer: We value and respect our existing commitments. If you’re currently on a ‘Web Only’ contract with us, there will be no immediate disruption to your services. Our team will continue to support you up until February 1st, 2023. After this period, we’ll only provide web services as part of our IT managed services. We’re here to guide you through this transition, ensuring it’s as smooth as possible.

What options do I have if I don’t want to transition to IT managed services?

Answer: We understand that every business has unique needs. If our comprehensive IT managed services aren’t a fit for you at this time, we’re committed to helping you transition your web services to a new provider of your choice. Additionally, we can recommend trusted partners who specialize in standalone web services.

Who can I speak to for more information or clarification?

Answer: We’re here to help. If you have any further questions or need clarification on this transition, please reach out to our dedicated transition team using the form below. They’re well-equipped to provide the guidance and support you need during this period.

 

 

[wpforms id=”9481″]

Dropsuite:

Dropsuite is a cloud software platform enabling businesses and organizations globally to easily backup, recover and protect their important business information including emails, contacts, calendars and OneDrive/Sharepoint files. Compliant email backup and archive system with a 10-year retention policy.

Vade Secure:

Vade Secure is an AI-based email security solution to improve security for Office 365 and block advanced phishing, spear phishing, and advanced malware threats. Vade Secure analyzes emails, webpages, attachments, and images with machine learning and deep learning algorithms that are trained to detect behaviors and anomalies common to advanced email threats.

Office Protect:

Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. Using our powerful in-house security software, our analysts actively monitor for threats, investigate alerts, eliminate false positives, and provide guided response and remediation. Protects against account break-ins, data exfiltration, business email compromise, phishing, internal threats, lateral movement, ransomware, and attacks by nation states.

Dark Cubed:

Dark Cubed focuses on real-time monitoring, threat intelligence, predictive analytics, elegant dashboard, streamlined workflow, executive reporting and active blocking. This is another layer of security that integrates with the firewall.

ThreatLocker:

ThreatLocker is a zero-trust endpoint security tool giving companies control over what software can run, by whom, and what data can be accessed.

It keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted. This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be.

ThreatLocker provides a solution that allows businesses to control the content that runs on their network. Unlike AntiVirus software ThreatLocker is not looking for known viruses or malware. ThreatLocker uses a complex set of rules to determine what can be executed on a network and stops anything that has not been approved before it can even execute.

Huntress:

Huntress is a supplement to SentinelOne. Hackers are becoming more sophisticated, and Huntress actively seeks out these threat actors with a "defend forward" mentality. This software combines both advanced security tools along with human intervention to ensure even the most advanced hackers can't penetrate your network.

SentinelOne:

SentinelOne is a comprehensive enterprise security platform that provides threat detection, hunting, and response features that enable organizations to discover vulnerabilities and protect IT operations. SentinelOne integrates static artificial intelligence (AI) to provide real-time endpoint protection and reduce false positives that derail investigations or make threat detection a capital-intensive process. This will replace Webroot in your current environment.