{"id":695,"date":"2026-01-12T19:19:46","date_gmt":"2026-01-12T19:19:46","guid":{"rendered":"https:\/\/zencybersecurity.com\/?post_type=product&#038;p=695"},"modified":"2026-01-15T13:44:33","modified_gmt":"2026-01-15T13:44:33","slug":"foundational-user-peace-of-mind-monthly-subscription","status":"publish","type":"product","link":"https:\/\/zencybersecurity.com\/index.php\/product\/foundational-user-peace-of-mind-monthly-subscription\/","title":{"rendered":"Foundational User Peace of Mind Monthly Subscription"},"content":{"rendered":"<p>The cornerstone to a foundational security practice to have competent, qualified, and certified professionals monitoring and responding to threats in your business.\u00a0 Zen Cyber Security leverages tools to ensure Enterprise class security tools to ensure the highest levels of security efficacy.\u00a0 This is the first step in your security journey <strong>Securing your User Identity!<\/strong>\u00a0 This solution focuses on ensuring robust security, with the initial step to provide your business the best starting point in your security posture.\u00a0 We leverage 2 tools to accomplish this.\u00a0 Cisco Email Threat Defense and Cisco Duo Multifactor Authentication.\u00a0 These tools are tied into our security management solutions where Zen Cyber Security Professionals will monitor and react to threats in real-time.<\/p>\n<p>Around 90% of all exploited environments originate from email!\u00a0 With AI being leveraged by the bad guys it is getting ever so difficult to know what is real and what isn&#8217;t.\u00a0 That is where <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/cloud-email-security\/secure-email-threat-defense-ds.html\">Cisco Email Threat Defense<\/a> (ETD) comes in.\u00a0 ETD is looking for Business Email Compromise, Scams, Phishing, Maliciousness (Embedded Malware), Spam, and Graymail.\u00a0 It uses AI to fight AI.\u00a0 It is extremely intelligent in finding the threats a normal person would not recognize.<\/p>\n<p>It is well known that if Multifactor Authentication (MFA) is used your organization is <a href=\"https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\/multifactor-authentication\">&#8220;99% less likely to be hacked&#8221;<\/a>.\u00a0 That is why we have it as a standard pillar in our user security protection.\u00a0 <a href=\"https:\/\/duo.com\/\">Cisco Duo<\/a> is an industry leader in MFA.\u00a0 We know that setting up MFA across all of your applications can be daunting.\u00a0 That is why we take care of it for you.\u00a0 As part of this service there is a one time initial cost.\u00a0 This cost covers integrating Duo with your Office 365 Tenant.\u00a0 It also includes integrating up to 3 other applications for your environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zen Cyber Security Professionals will actively monitor and respond to the threats attacking your business.\u00a0 We are the ones watching your security, while you focus other critical priorities in your business.<\/p>\n<p>Email Threat Defense &#8211; Protecting against the number 1 most vulnerable technology you own, email.\u00a0 Cisco Product Description: <em><strong><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/cloud-email-security\/secure-email-threat-defense-ds.html\">Cisco Email Threat Defense<\/a><\/strong><\/em><\/p>\n<p>Duo Multifactor Authentication &#8211; Protects against bad guys signing into your critical applications.\u00a0 Cisco Product Description: <em><strong><a href=\"https:\/\/duo.com\/\">Cisco Duo<\/a><\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"featured_media":780,"comment_status":"open","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"product_brand":[],"product_cat":[20,21],"product_tag":[],"class_list":{"0":"post-695","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-service","7":"product_cat-subscription","9":"first","10":"instock","11":"virtual","12":"purchasable","13":"product-type-subscription"},"_links":{"self":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product\/695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media\/780"}],"wp:attachment":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=695"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_brand?post=695"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_cat?post=695"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_tag?post=695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}