Set Your Cybersecurity on Cruise Control
plus a dedicated Cybersecurity Specialist from $89/mo
- Your Own Dedicated Cybersecurity Specialist
Cybersecurity Best Practices and Procedures
Automate Device Protection, 24/7 Monitoring and Remediation
- Relief From Complex Cybersecurity Issues
- Annual & Comprehensive Cybersecurity Audits
- Secure Your Data & Rest Easy!
By submitting my data I agree to be contacted
The Most Important Cybersecurity Guidance for Small Businesses on Cruise Control
Today, Kizata’s Cybersecurity Cruise Control keeps small businesses cybersecurity compliant all year long, with up-to-date information protection policies, mandatory training, and 24/7 monitoring.
Protocols and Security Standards That Shield Your Network and Standardize Your Digital Environment
CYBERSECURITY AUDITS
Cyber threats evolve. Assessments allow you to pinpoint any security vulnerabilities, and then we assist you with a strategy to update your internal defenses, ensuring the continuous protection of your organization and staff.
Protocols and Security Standards That Shield Your Network and Standardize Your Digital Environment
CYBERSECURITY POLICIES
Cybersecurity Cruise Control ensures all core protective measures are up-to-date, acknowledged by your team, and revalidated semi-annually. Then, your dedicated Security Specialist tailors any custom cybersecurity protocols your business requires.
Training That Keeps Your Team Safe and Informed
SECURITY EDUCATION & CERTIFICATIONS
Our platform ensures up-to-date and critical cybersecurity training such as phishing prevention, data protection, and digital ethics – and keeps you in the loop on everyone’s advancements.
Protect all computing devices from malware, ransomware and spyware.
END POINT PROTECTION AND MONITORING
Our Cybersecurity Cruise Control provides comprehensive endpoint protection for your computing devices, including: malware detection and remediation, continuous AI monitoring 24/7 monitoring and response to help remediate problems when they happen.
Cybersecurity Cruise Control protects money, data, and IT equipment
SECURED DATA
Securing:
- Access to customer lists
- Customer credit card information
- Your company’s banking details
- Your pricing structure
- Product designs
- Business growth plans
- Manufacturing processes
- Other types of intellectual property
Lower insurance costs and reduce risk by complying with industry best practices
ENSURE CYBER-INSURANCE READINESS
Dive deep with a thorough risk evaluation, fortified security measures, a proactive breach response strategy, timely system enhancements, employee cyber-awareness sessions, and full alignment with industry standards.
Expert guidance from your own
Cybersecurity Specialist
Sometimes, you need expert oversight. Our platform provides you with a dedicated Cybersecurity Specialist who assists you in designing robust security protocols and achieving compliance standards.
- Kizata Certified
- Cybersecurity expereince
Network Vulnerabilities & Cybersecurity Solutions
The most critical threats demand comprehensive discussions. Your Cybersecurity Specialist collaborates with you to ensure the best protection for your business.
Craft Cybersecurity Protocols, Measures & Shape Digital Culture
Your Cybersecurity Specialist develops strategies tailored for your business, based on industry standards and your unique digital culture for optimum protection.
Navigate Cyber Threats with Precision
Your Cybersecurity Manager will guide your team through the incidence response process, the steps to take before, during and after a security incident.
Security Consulting & Expertise
Your Cybersecurity Specialist connects with you personally, providing comprehensive remote security support and tailored advice where you need it most.
Cybersecurity Cruise Control Protects Small Businesses
By 2027, 75% of employees will acquire, modify or create technology outside IT’s visibility – up from 41% in 2022.
Automating Protection of End User Devices Protects Company Data
Business leaders want protection from financial loss, protection of trust and reputation, regulatory compliance, business continuity, competitive advantage and peace of mind.
Understanding Cybersecurity Policy Protects Data
The business is better protected when employees understand good cybersecurity hygiene.
Intellectual Property is More Valuable than Ever
A company’s intellectual property is invaluable. Cybersecurity measures ensure that trade secrets, proprietary methods, and other confidential information remain safe.
Increase Customer and Partner Trust
When customers and partners see that cybersecurity is taken seriously, it reinforces their confidence.
Avoiding Downtime
Downtime due to a cyber breach can be costly in terms of revenue and customer trust. By having strong cybersecurity measures, we minimize the risk of downtime
Flexible plans and services. No hidden fees.
Starter
- The simple Cybersecurity protection with device protection and 24/7 monitoring
- 1-3 Employees
No Setup Fee
Includes:
- Access to Kizata Cybersecurity
- Cybersecurity support for up to 3 employees
- Monthly cybersecurity compliance reports
- 4 Core Information Protection Policies
- 2 Custom Information Protection Policy
- 1 Device Protection with 24/7 monitoring
- Cybersecurity alerts
- Vulnerability Scans
- Chat and email support
Standard
- The simple Cybersecurity protection with device protection and 24/7 monitoring
- 4-9 Employees
$250 Setup Fee
Includes:
- Dedicated Cybersecurity Specialist
- Cybersecurity support for up to 9 employees
- Monthly cybersecurity compliance reports
- 4 Core Information Protection Policies
- 2 Custom Information Protection Policy
- 1 Device Protection with 24/7 monitoring
- Cybersecurity alerts
- Vulnerability Scans
- Chat and email support
Professional
- The simple Cybersecurity protection with device protection and 24/7 monitoring
- 10-19 Employees
$500 Setup Fee
Includes:
- Dedicated Cybersecurity Specialist
- Cybersecurity support for up to 19 employees
- Monthly cybersecurity compliance reports
- 4 Core Information Protection Policies
- 2 Custom Information Protection Policy
- 1 Device Protection with 24/7 monitoring
- Cybersecurity alerts
- Vulnerability Scans
- Chat and email support
Growth
- The simple Cybersecurity protection with device protection and 24/7 monitoring
- 20-49 Employees
$750 Setup Fee
Includes:
- Dedicated Cybersecurity Specialist
- Cybersecurity support for up to 49 employees
- Monthly cybersecurity compliance reports
- 4 Core Information Protection Policies
- 2 Custom Information Protection Policy
- 1 Device Protection with 24/7 monitoring
- Cybersecurity alerts
- Vulnerability Scans
- Chat and email support
How We Maintain Top-Tier Cybersecurity
Without Breaking the Bank
Cybersecurity Tailored for Small Businesses
We exclusively cater to businesses with fewer than 250 devices. This means we’re experts at addressing your specific cybersecurity challenges daily.
Cybersecurity Cruise Control
Cybersecurity Cruise Control automates your core security protocols to keep you cyber-safe all year round.
Cutting-Edge Cybersecurity for Today's World
We harness the latest cybersecurity technologies to keep you updated on digital threats & ensure you’re always protected.
The Kizata Promise
Your Cybersecurity Specialist will be a certified professional, seasoned with organizations of your scale, and trained in online safety and client support. All tailored security measures are encompassed within your consistent, monthly rate. Any extra features you opt for will come with a transparent and predetermined fee. Zero concealed charges.
How does Kizata Work?
Kizata Business Protect AI-Powered Threat Detection/Antivirus and Monitoring, 24/7 Endpoint Prevention Detection and Response (EDR), Malware/Virus Response and Remediation, Advanced Endpoint Protection Controls for Business, Vulnerability Scanning for Business and more.
OS Name | OS Version |
---|---|
Ventura | 13.2, 13.2.1, 13.1, 13.0 |
Monterey | 12.6.1, 12.6.2, 12.6.3, 12.6, 12.5.1, 12.5, 12.4, 12.3.1, 12.3, 12.2, 12.2.1, 12.0, 12.1 |
Big Sur | 11.7.4, 11.7.3, 11.7.2, 11.7.1, 11.7, 11.6.8, 11.6.7, 11.6.6, 11.6, 11.5.2, 11.5.1, 11.5, 11.4, 11.3.1, 11.3, 11.2, 11.1, 11.0 |
Minimum Hardware Requirements
Minimum | Recommended |
---|---|
1 GHz dual-core CPU or better | |
1 GB RAM or more, according to the operating system requirements | 2 GB RAM or more |
2 GB free disk space |
Windows OS | Details |
---|---|
Windows Server Core | 2022, 2019, 2016, 2012 |
Windows Server | 2022, 2019, 2016, 2012 R2, 2012, 2008 R2 SP1
Note: Windows Server 2012 R2 on an AWS T3 instance requires a workaround for agent not showing in console:
|
Windows Storage Server | 2016, 2012 R2, 2012 |
Windows 7 SP1, 8, 8.1, 10, 11 | 32/64-bit
All Windows Agents, starting from version 21.5.2, fully support Windows 11. All versions of Agents that are supported according to the lifecycle are tested for compatibility for each Windows 10 release. Some Deep Visibility functionality is not fully supported on Windows 10 Redstone 5 (October 2018 Update) with 2.5, 2.6, and 2.7 Agents. If you upgrade a Windows 10 endpoint to RS5, TCP connection events are reported for Windows Agents of version 2.8+. Important: For Agents installed on Windows 8.1 and Windows Server 2012 R2: To update the OS with Microsoft Updates, click this link. These updates are required for the endpoints to connect to the Management. If you do not download these updates, the endpoints will be rejected by the Management due to weak SSL. Download the updates in this order:
Microsoft ended support for Windows 7, January 2020. SentinelOne continues to support Agents on Windows 7 for up to three years after the Microsoft End Of Life declaration. Windows 10 offers a much better security architecture than Windows 7, and the Agent on Windows 10 supports these enhanced security features. Therefore, we strongly advise that you migrate your endpoints to Windows 10. |
Editions | Supported editions: Home, Pro, Pro for Workstations, Enterprise, Education, Pro Education, Enterprise LTSC, Embedded (UI issue fixed in Agent version 3.4.1.7), Windows 10 IoT Enterprise
Not supported: Mobile, Windows 10 IoT Core |
Minimum | Recommended |
---|---|
1 GHz CPU or better
Single-core (can install but there are performance issues) |
Dual-core |
1 GB RAM | 2 GB RAM or more |
2 GB free disk space on the Windows partition
10% of disk for VSS snapshots |
3 GB recommended
10% of disk for VSS snapshots |
Minimum | Recommended |
---|---|
Windows Defender | On Windows Servers, Microsoft Defender Antivirus do not enter passive or disabled mode if you have SentinelOne installed. We recommend that you uninstall Microsoft Defender Antivirus on Windows Servers to prevent interoperability issues.
The behavior when an Agent is installed on an endpoint with Windows Defender installed differs depending on the Windows OS version. |
.NET Framework 4 and later on Windows 7 and Server 2008 R2 for the old EXE installer (earlier than Agent version 22.1). | Not needed for the MSI installer or the new EXE installer (Agent version 22.1+). |
On Windows 10 version 1607 and Windows Server 2016, install Microsoft KB4093119, to make sure old logs in ProgramDataSentinellogs are deleted. | An endpoint should have only 16 log files, taking up no more than 1.6 GB. |
On Windows 8.1 and Windows Server 2012 R2, install update 2919355 to enable new TLS cipher suites. | |
On Windows 7, Windows 7 Service Pack 1 (SP1), Windows Server 2012, and Windows Server 2008 R2 SP1, install the Update to enable TLS 1.2 as default secure protocols in WinHTTP and add the Registry subkey, as shown in the article. | Management-Agent communication uses TLS 1.2. This is not supported by default in Windows 7. You must install this update and add the registry subkey, as shown in the article. |
KB3033929 (SHA2) – Security Update for Windows 7 SP1 and Windows Server 2008 R2. | This security update must be installed on Windows 7 SP1 and Windows Server 2008 R2 SP1 to meet minimum requirements for the installer. |
KB2758857 for Windows 7 and Windows Server 2008 R2 or KB4457144 – Security updates for Windows 7 SP1 and Windows Server 2008 R2 | After you install the security updates, you must restart the endpoint and run the Agent installation again. |
Microsoft Windows Volume Shadow Copy Service (VSS) | Configure VSS before you install the Agent. |
GPO Chrome Extensions | The SentinelOne Chrome extension is part of the Agent installation. When you install or upgrade the Windows Agent with GPO, Chrome extensions must be enabled. |
GPO Privileges | The administrator who runs Agent installation through group policy must have RESTORE and TAKE OWNERSHIP privileges to prevent an installer crash. |
DigiCert | If the endpoint does not get Windows updates, you must manually install DigiCert for the Agent to communicate with the Management. |
Windows Root Certificates | Update Windows Root Certificates. If you do not, it could lead to invalid signature errors. |
Windows Services set to Automatic | Base Filtering Engine Service
Windows Update Service |
Required Windows Administrator Permissions
The Windows Agent installer works on supported Windows endpoints with default settings. If your environment is hardened with specific changes, the installer might fail or crash. Make sure your environment fulfills these requirements for a successful installation.
- The Windows Agent installation requires Administrator permissions, with write permissions to C:UsersPublicDocuments and C: root. Install only as an Administrator, whether local, remote, GPO, or other.
- The Agent Anti-Tampering process restores and takes ownership of files during installation. The user running the installation must have Restore and Take Ownership privileges (default for Windows Administrator).
- The Agent Installer adds a trusted publisher to the machine certificate store that signs the PowerShell profile script of its PowerShell Protection. The local Administrator user must have privileges to install trusted publisher certificates.
- The Agent Installer creates a backup of the ELAM driver in the ELAM backup directory, ELAMBKUP, configured in the system registry. This directory must exist.
- The Agent installs drivers to the Program Files directory. The Program Files directory must be on the system boot volume.
- The Windows System user is required. Do not delete it!
- The Windows Management Instrumentation (WMI) Service (winmgmt) is required.
Kizata is an outsourced cybersecurity protection and compliance solution for small businesses. With your own dedicated Cybersecurity Specialist, Kizata helps your business with Cybersecurity Best Practices and procedures; Device Protection and Alerting; and Relief From Complex Cybersecurity Issues.
How Does Kizata Ensure Your Digital Safety? At Kizata, we firmly believe that every entrepreneur should enjoy top-tier cybersecurity support without breaking the bank.
Here’s our approach:
- When you team up with Kizata, we delve deep into understanding your digital ecosystem and current protective measures. No need for apprehensions – perfection isn’t a prerequisite here. Our mission is to pinpoint areas of improvement and align you with the latest best practices.
- A dedicated Cybersecurity Specialist will be by your side. Together, we’ll spot the vulnerabilities in your security framework, and devise a tailor-made strategy to fortify your business. Priority will be given to immediate threats, followed by a structured plan to bolster overall defense.
- Enter our ‘Cybersecurity Cruise Control’ – delivering essential protection protocols that every enterprise requires.
For intricate challenges, lean on your Cybersecurity Specialist. They will navigate you through every scenario, addressing all queries to ensure you’re shielded. Face a security breach? We’re here to guide your response.
Remember, as a Kizata member, our cybersecurity expertise is always at your beck and call.
Share your worries with us and brace yourself for unparalleled cybersecurity peace of mind, exclusively from Kizata.
A full time cybersecurity department can cost over $10000 per month, and even outside consultants can set your business back by over $5000 per month. Kizata is month to month membership starting at $29 per month that you can cancel anytime.
A Fractional CISO is a part-time security executive who provides the same expertise and strategic oversight as a full-time CISO, but tailored to the scale and needs of smaller organizations or those not requiring full-time support.
- Value to Your Organization: Enhances your cybersecurity strategy without the full-time executive cost.
- Cost Advantages: More economical, reducing payroll and related expenses.
- Industry Best Practices: Brings fresh perspectives and the latest security practices to your team.
- Onboarding Process: Customized integration plans that align with your existing business and security frameworks.
- Collaboration: Works closely with IT and security teams to fortify defenses and strategies.
- System Access: Secured and controlled access to necessary systems for effective management
- Incident Response: Immediate and effective actions to manage and mitigate security incidents.
- Communication: Maintains clear lines of communication throughout the incident resolution process.
- Regulatory Assistance: Helps ensure compliance with laws like GDPR and HIPAA.
- Staying Updated: Continuously monitors evolving cybersecurity regulations to keep your practices compliant.
- Billing Models: Flexible billing options, including monthly retainers.
- Additional Costs: Transparent about any costs related to extraordinary projects or incident responses.
-
Transition Assistance: Supports in the hiring and training of a full-time CISO.
-
Offboarding: Streamlined process to ensure a smooth transition without loss of knowledge or security integrity.
A Fractional CIO (Chief Information Officer) provides strategic leadership and guidance on IT initiatives on a part-time or contract basis. This role is designed for organizations that need executive-level IT leadership without the commitment to a full-time position.
Unlike a full-time CIO, a Fractional CIO works on a flexible schedule, typically part-time, which reduces costs while still providing strategic guidance. Unlike a consultant, a Fractional CIO takes on ongoing responsibility for your IT strategy and execution, rather than focusing on specific projects or temporary fixes.
A Fractional CIO oversees IT strategy, technology roadmaps, IT budgeting, cybersecurity, compliance, and IT team leadership. They ensure that IT systems and strategies align with the overarching business goals.
A Fractional CIO is significantly more cost-effective than a full-time CIO, as you pay for services only when needed. This avoids the full-time salaries, benefits, and other overhead costs associated with a full-time executive.
Payment structures are flexible; including: monthly retainers and project-based fees, depending on your organization’s needs and the scope of work.
Availability is flexible and based on your needs—it can range from a few hours a week to several days a month. We tailor this based on the strategic requirements of your business.
Engagements can vary from a few months to several years, depending on the project scope and business objectives.
Our Fractional CIOs bring a wealth of experience, typically having worked across multiple industries on IT strategy development, digital transformation, cybersecurity, and compliance.
The Fractional CIO will work closely with your existing IT team and management, ensuring seamless integration through regular meetings, strategic sessions, and hands-on guidance.
Onboarding involves an initial assessment of your IT landscape, strategic meetings with key stakeholders, and a detailed plan outlining key objectives and timelines.
A Fractional CIO assesses your current IT capabilities and business goals to develop a comprehensive IT strategy that includes technology upgrades, cybersecurity enhancements, and innovation initiatives.
Absolutely. While addressing immediate IT needs, the focus is also on long-term strategic planning to ensure sustainable growth and technology alignment with business goals.
Success is measured through specific KPIs aligned with your business objectives, such as improved system performance, cost savings, and project milestones.
Regular reports will be provided, detailing progress on IT projects, budgeting, compliance status, and strategic recommendations.