Cybersecurity needs to be a top priority for RIAs. Our team at GVA has been proactively designing a solution that will help advisors in the GVA network safeguard their practices and client data, and we are excited to share more on GVA SecureOffice, a new cybersecurity-focused platform powered through our partnership with a leading technology and advisory firm in the investment management industry.

GVA’s SecureOffice platform includes management of your entire technology landscape, including:

  • Desktops & Mobile Devices
  • Firewalls, Switches, and WAPs
  • Software Patch Management
  • Windows updates for workstations
  • Virus, Anti-Spam, and Web Filter Software
  • Monitoring of Desktop and Network Infrastructure
  • Remote Support Service Desk – 24 x 7 x 365
  • Microsoft Application Support
  • Office 365 Advanced Threat Protection (ATP)
  • ATPSafe Links – protects the organization by providing time-of-click verification of web addresses (URLs) in email messages and Office documents.
  • ATPSafe Attachments – this feature checks to see if email attachments are malicious, and then takes action to protect your organization.
  • Veeam Backup for Microsoft 365 – Veeam Backup for M365 eliminates the risk of losing access to your Microsoft 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams.

Azure Active Directory (Azure AD) is Microsoftʼs cloud-based identity and access management service, which allows users to sign into the Office365 environment utilizing a single sign on experience. User password management is controlled through AzureAD, password policies are as follows:

  • Passwords are set to expire every 90 days
  • Complexity requirements
    • Cannot reuse previous five passwords
    • Must not contain username, or parts of it
    • Must contain three of the four categories: uppercase, lowercase, number, special character

AzureAD Identity Protection protects against the following scenarios:

  • Users with leaked credentials
  • Sign-ins from anonymous IP addresses
  • Impossible travel to atypical location
  • Sign-ins from infected devices
  • Sign-ins from IP addresses with suspicious activity
  • Sign-ins from unfamiliar locations

Device-based Conditional Access

Utilizing Microsoft Intune and Azure Active Directory, only corporate managed and compliant devices can gain access to the organizations Office365 environment.

Microsoft Authenticator is a multifactor app for mobile devices that generates push notifications or time-based codes for two step verification into users Microsoft accounts.

  • All users are required to enable Multi-Factor Authentication (MFA)
    • Users will be required to authenticate trusted devices every fourteen days.
    • If the device is not trusted (e.g.the user has never logged into the device), a request for authentication will be required.

Intune is a cloud-based service that allows the organization to place a management profile on end-userʼs mobile devices and ensures users mobile devices (phones/tablets) are compliant with corporate security standards.

  • Screen lock set to 15minutes or less
  • Minimum password protections
  • Block jailbroken devices

Remote Wipe

  • In the event a device is lost or stolen, corporate data can be remotely wiped.
  • Cisco Umbrella is a cloud-driven secure internet gateway that provides protection from internet-based threats no matter where workstations are located.
  • Umbrella allows the organization to restrict access to websites that are potentially malicious or against corporate standards (e.g. pornography, social media, and personal email).

MS Data Loss Prevention (DLP)

  • Allows client to implement controls to enforce their own data governance policies.

Encryption

  • BitLocker Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.
  • Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computerʼs hard disk to a different computer.
  • BitLocker helps mitigate unauthorized data access by enhancing file and system protections.BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled.
  • Monitors endpoints on and off the network around the clock with a 24 x 7 x 365 Global Security Operations Center.
  • Assumes the suspicious is malicious sending all endpoint activity that has not been seen before to an elite team of threat hunters.
  • Protects your endpoints anywhere users and data reside–across cloud, mobile, virtual, and physical environments.
  • Accelerates forensic investigation, acting as a “black box” flight recorder that continuously records, centralizes, and retains vital endpoint activity.
  • Catches what prevention misses with proprietary machine learning layered with attack patterns and behavioral analytics.
  • Locks down and isolates threat actors on your behalf preventing lateral spread and potential business disruption.

Remote Support Service Desk – 24 / 7 / 365

Our dedicated support experts are here to provide you with the technical support you need to address any problem you might have with the SecureOffice platform. Our experts are qualified to manage most situations, but we also maintain a network of referrals in cases requiring additional experience. We recognize that you rely on speed and precision, so we are always keeping ahead of the curve when updating and tech support.

The files you store on a SharePoint site are usually available to everyone with permission to the site, but you may want to share specific files or folders with people who don’t otherwise have access to the site. When you share files and folders, you can decide whether to let people edit or just view them. Read more on how to properly share files.

Pricing (includes Office 365 E5 + Windows 11 license)

  • 1-5 Users: $200/user/mth
  • 6-10 Users: $175/user/mth
  • 11+ Users: $150/user/mth