Call I.T. Roadmap at 214-321-1110          



Spambots. Trojans. Hackers. Worms. Malware. The words even sound toxic.

According to a new report released by the web security company Symantec, the number of malicious attacks on computer systems rose 81% last year. It just keeps getting harder to be a legitimate computer user when surrounded by criminals and other thugs who wish to exploit your data for their own malevolent purposes. Malware keeps becoming more sophisticated, mobile devices have given hackers a new platform to misuse, and social networks such as Facebook make it easy for them to reach new victims.

Small and medium-sized businesses have special reason to be concerned. This same report from Symantec noted that half of all attacks were launched against companies with fewer than 2,500 employees, and 18% had fewer than 250. They noted that hackers may be attempting to access customer data or valuable secrets of larger companies, who may have whole departments devoted to network security, through their vendors and partners…. i.e., small businesses.

I.T. Roadmap can help. We will evaluate your network, your individual computing assets, and your practices, and we will identify security holes. We will install proven anti-spyware and anti-virus protection, and we will advise on the use of third-party applications that exceed our expectations for data encryption and credential verification. If you are hacked, we can resolve the problem with all due speed. But we thoroughly believe an ounce of prevention is worth a pound of cure, so we take a pro-active approach to security. Call us at 214-321-1110 to schedule a consultation today.

McAfee Endpoint User ProtectionI.T. Roadmap offers McAfee SaaS Endpoint Protection, a cloud-managed security software that protects your Microsoft Windows-based desktops, laptops, and file servers. McAfee® SaaS Endpoint Protection secures your business with enterprise‐class computer and server protection that is flexible, affordable, and easy to manage. It shields your business from data‐stealing malware, viruses, spyware and the latest hacker threats. Cloud‐based security delivers the most effective, up‐to‐date security without requiring a management server.

McAfee SaaS Endpoint Protection includes the following functions:

  • Desktop and file server antivirus and anti-spyware block and scan for threats
  • Desktop firewall blocks hackers and intrusions
  • McAfee SiteAdvisor® technology displays color-coded website safety indicators that warn your users before they click on risky sites
  • McAfee SecurityCenter is used for centralized online management and reporting

Antivirus & Antispyware

McAfee SaaS Endpoint Protection guards both computers and servers against viruses and spyware. This “hands‐off” solution protects the computers on your network automatically by keeping itself up to date while continuously checking or threats contained in files and programs, email messages, communications from inside and outside the network, and on websites. It swiftly detects viruses, spyware, worms, Trojans, and other potential threats on devices, removable media, or the network. Every time a file on your computer is accessed, virus and spyware protection scans the file to make sure it is free of anything potentially harmful.

Desktop Firewall Security

McAfee desktop firewall technology establishes a barrier between each computer and the Internet or other computers on your local network. The desktop firewall silently monitors communications traffic for suspicious activity and takes appropriate action, such as blocking.

Browser Safety

McAfee SaaS Endpoint Protection relies on McAfee SiteAdvisor® to display information about websites to help safeguard users against web‐based threats. Users can view website safety ratings and safety reports as they browse or search. And web filtering allows administrators to control access to websites based on safety rating, content category, or specific URLs.

Data Breach Protection

iScanOnline Data Breach Prevention Program

We live in a world of branch offices, remote workers, transient contractors and mobile users. And while they may not know the difference between BYOD and BYOB, they are leading the charge towards mixed- use devices and non-standard business platforms. Microsoft Windows, while still representing a large portion of the market, is no longer at 95% market share. In fact, PCs themselves represent a smaller and ever-shrinking share of the devices on our networks.

Virtually every network today has a wide array of smartphones, tablets and personal devices of many shapes and sizes constantly requesting access. All of these different devices access our network from different locations and at different times. Worse, lax or non-existent security policies among users mean that, while your network may be buttoned-up, your users are still prone to downloading malware or infiltration by bad actors who use their trusted credentials as a pivot point into your network.

Since a large percentage of the devices that access the network are no longer available to scan during off-peak times, a traditional network security scan is essentially ineffective for those devices. These unscanned devices and the unencrypted data they contain are the dark matter of your network. They exist and they are an important part of the network, but there is no evidence or means to quantify the risk they pose.

I.T. Roadmap has partnered with the iScan Online Data Breach Prevention Platform to proactively discover unprotected sensitive information and detect vulnerabilities before a data breach occurs. iScan Online is the recipient of SC Magazine’s Security Innovator of the Year award, and gives us a valuable tool to help your organization prevent a data breach.

Ready to get started?