What is inTRUST?
In today’s digital landscape, ensuring the security and compliance of our clients’ IT infrastructure isn’t just an option – it’s a necessity. inTRUST offers a tailored solution to proactively monitor our clients’ digital assets while ensuring they meet the rigorous standards of Cyber Essentials Plus.
Traditionally, when attempting to achieve Cyber Essentials Plus, our clients infrastructure will undergo vulnerability scans and associated remediation. These scans are only a “snapshot in time”, so new vulnerabilities or rogue devices can cause an instant fail immediately after a CE/CE+ certificate has been issued.
inTRUST is a real-time view of your security posture, so our customers do not have to wait up to 12 months before new vulnerabilities are identified.

What are the key features of inTRUST?
- Centralised monitoring of your IT environment.
- Swift detection of suspicious activities and anomalies.
- Comprehensive log management and intelligent correlation to pin-point threats.
- Improved incident response times with actionable alerts.
- Continuous scanning of IT assets to identify and report vulnerabilities.
- Prioritised risk assessment to guide remediation efforts.
- Minimise attack surface by catching vulnerabilities before they are exploited.
- Conformance to Cyber Essentials Plus / CIS / NIST standards.
- Demonstrable commitment to cyber security, elevating trust with partners and clients.

What are the benefits of
inTRUST to your organisation?
Vulnerability Detection
Detect vulnerabilities on monitored endpoints where you deploy the inTRUST agent.
inTRUST prioritises identified vulnerabilities to speed up your decision-making and remediation process. Our vulnerability detection capability ensures you meet regulatory compliance requirements while reducing your attack surface.

Endpoint Detection & Response (EDR)
Leverage inTRUST’s EDR capability to detect and respond to advanced threats.
With its built-in continuous endpoint monitoring and behavioural analysis. inTRUST delivers comprehensive endpoint defence. With new threats being developed and released into the wild every day, rest assured knowing that even the most advanced threats are caught by inTRUST’s EDR.

Regulatory Compliance
Simplify the process of meeting regulatory compliance requirements by using inTRUST.
inTRUST helps you track and demonstrate compliance with various regulatory frameworks such as CE+, PCI DSS, NIST800-53, GDPR, TSC SOC2, and HIPAA.

Alerting & Notification
Receive real-time alerts and notifications when security incidents occur.
inTRUST correlates events from multiple sources, integrates threat intelligence feeds, and provides customisable dashboards and reports. You can customise alerts to meet specific requirements. This allows security teams to respond quickly to threats and minimise the impact of security incidents.

What are the next steps?
Here at inTEC, we bring a wealth of experience in cyber security, backed by industry-leading accreditations such as IASME Cyber Essentials Certification. Our expertise ensures your organisation receives reliable, effective and compliant security solutions tailored to your needs.
We offer four inTRUST packages: |
BASIC |
STANDARD |
PREMIUM |
VULNERABILITY APPLIANCE |
Remote monitoring and management (rmm) |
|
|
|
Vulnerability Scanner Virtual Machine License
|
Microsoft patching |
|
|
|
|
Anti-virus |
|
|
|
|
Endpoint detection & response (edr) |
|
|
|
|
Ransomware protection |
|
|
|
|
3rd party patching |
|
|
|
|
Vulnerability scanning for endpoints* |
|
|
|
|
|
|
|
|
|
*Vulnerability scanning appliance for network device scanning requires on-site hypervisor (ie/ Hyper-V or VMWare server).
Get the cover you need
We offer 7/24/365 cover – with an IT helpdesk there to support you whatever challenges you throw at us.
We’ve got you covered.