Promote this Nomination

Additional Info

Websitehttps://www.fortisbysentinel.com/
Company size (employees)500 to 999
Headquarters RegionNorth America

In 3 bullets, summarize why this company is different from the competition and deserves recognition:

• Fortis provides end-to-end cybersecurity services to clients, with 250+ in-house experts ready to assist clients of all sizes and industries with their protection needs. Fortis also partners with industry-leading security providers (such as Cisco, Splunk, Darktrace, Cylance, Fortinet, Varonis, and Microsoft) to deliver best-of-breed solutions capable of being managed and monitored by the Fortis team. The large range and diversity of Fortis offerings creates single-source accountability, so clients do not need to worry about dealing with other security service providers who may be less reliable, more expensive, or difficult to deal with.
• Fortis believes in uncompromising customer service in order to engender fanatical customer loyalty. The Fortis team goes above and beyond for clients, and remains available 24x7x365 to ensure they can respond immediately to any issue, be it a minor malfunction of a security product or a full-scale ransomware attack. The Fortis average response time for a security incident is 8.5 minutes, which is much faster than the current industry standard.
• Fortis takes a unique approach to cybersecurity services, with the development of its own custom software and applications to enhance protection for all clients. Fortis ActiveDefense Software (ADS) handles event correlation while comparing data with multiple globally respected security intelligence databases. The Fortis Network Intrusion Detection (FNID) sensor takes in events and security data. The Fortis CloudSelect HA Platform is configured for high availability (HA) and housed at a Tier Three colocation facility. Fortis Threat Exchange (FTE) normalizes and enriches security alert data by providing deeper insights to maximize protection of critical assets. Fortis Adaptive Threat Response (ATR) is proprietary correlation software specifically designed for firewalls to automatically block threats.

Brief Overview

Fortis offers a comprehensive portfolio of cybersecurity services designed to proactively protect every aspect of physical and digital environments. The Fortis mission is to ensure all clients have the most effective tools to defend their systems, data, and users against an ever-evolving threat landscape.

It starts with security advisory and consulting services, which include a wide variety of ways for Fortis clients to learn more about their current security posture and begin to develop new ways to enhance protection. Assessments, penetration testing, workshops, tabletop exercises, compliance and governance, strategy development, and user training are all ways Fortis helps clients strengthen their day-to-day security operations.

Fortis ActiveDefense Monitoring provides critical, real-time visibility into the risk factors organizations face today. In order to monitor client environments effectively, Fortis assesses existing IT and security infrastructure, how it aligns with the rest of the organization and best practices, as well as any compliance or governance requirements that need to be met. ActiveDefense Monitoring has the ability to cover the following areas and disciplines: endpoint, edge, decoy, identity, SD-WAN, network, workload, cloud, IaaS, and SaaS.

Fortis also offers longer term contract engagements that provide proactive assistance with a variety of tasks throughout security environments, including: 24x7x365 threat monitoring through the Fortis SOC and SIEM, highly scalable cloud-based protection through Security as a Service (SECaaS), and managed security services that handle monitoring, maintenance, and support for security infrastructures.

Last but not least, Fortis handles incident response, forensics, and ActiveRecovery services for clients should an attack breach their defenses. The Fortis team of highly experienced and certified experts stay on top of the latest strategies and vectors utilized by cyber criminals so they can respond and fight back quickly, investigate the root cause of the attack, and assist in restoring systems back to a fully functional state.