Recommended Minimum Security Stack

It only takes one email to trick your employees and penetrate your network – You need a security stack

Relying simply on a basic Anti-Virus is no longer enough. A unified, modern security stack helps ensure consistent protection across all users, devices, and environments. Below is our recommended lineup, along with a clear explanation of why each solution is essential

1. IRONSCALES – Advanced Email Security & Phishing Protection

Why it’s needed: Email remains the number one attack vector for cyber‑criminals. IRONSCALES uses AI‑driven behavioural forensics to detect phishing, unusual language patterns, and compromised email accounts—even when a malicious message appears to come from a trusted sender. It provides far stronger protection than legacy spam filters and significantly reduces the risk of account takeover and social‑engineering breaches.

Tiers Available:

  • Email Protect (Standard) – Core AI‑driven email security.
  • Complete Protect (Higher Tier) – Includes Teams protection, account‑compromise monitoring and Security Awareness Training.
  • SAT Training Standalone – For customers wanting only awareness training.

Licensing Note: Shared mailboxes are free unless they exceed 30% of licensed mailbox count.


2. Datto Entra ID Backup

Why it’s needed: Beyond mailbox backups, businesses must protect their identity infrastructure. Datto Entra ID Backup safeguards critical Microsoft 365 Entra configurations—including user identities, groups, roles, and policies—similar to backing up a domain controller. This ensures fast recovery after accidental changes, attacks, or misconfigurations.

Licensing Note: Charged per licensed user in the tenancy.


3. SentinelOne – AI‑Powered Endpoint Protection (EDR)

Why it’s needed: Modern malware and ransomware can bypass traditional antivirus. SentinelOne uses AI and behavioural detection to stop both known and unknown threats in real time. It provides autonomous remediation and deep visibility across endpoints.

Tiers Available:

  • Control (Standard) – Strong baseline protection.
  • Complete (Advanced) – Adds advanced threat hunting, rogue‑device detection, and deeper telemetry.
  • Complete + Vigilance SOC – 24/7 human‑led threat monitoring and incident response for maximum protection.

Licensing Note: Licensed per device.


4. ConnectSecure Vulnerability Scanning

Why it’s needed: Cybersecurity isn’t just about blocking threats—it’s about identifying weaknesses before attackers exploit them. ConnectSecure continuously scans networks, devices, and cloud assets for vulnerabilities, misconfigurations, and compliance gaps. Reports translate technical issues into easy‑to‑understand summaries for customers.

Useful for:

  • Identifying outdated systems
  • Highlighting insecure configurations
  • Supporting ongoing security reviews

5. DNSFilter – Web Filtering & Threat Prevention

Why it’s needed: DNS‑level protection stops threats before a connection is even established. DNSFilter blocks malicious websites, phishing domains, botnet traffic, and inappropriate content—ideal for remote workers or customers without enterprise‑grade firewalls. Protection follows the user anywhere.


6. Datto Advanced Software Management (ASM)

Why it’s needed: Unpatched applications are a major cause of breaches. ASM allows automated deployment, patching, and updating of third‑party software across all endpoints—reducing vulnerabilities and saving significant technician time.

A strong addition for all remote‑support customers.


7. Keeper Password Manager (with BreachWatch)

Why it’s needed: Password reuse and weak credentials remain a top cause of compromise. Keeper stores credentials in an encrypted vault and enforces strong password hygiene. BreachWatch monitors the dark web for leaked logins and alerts users before credentials are abused.

Ideal for improving user security behaviour and reducing account compromise risk.


Summary

This recommended security stack provides:

  • Comprehensive threat detection (email, endpoint, DNS, identity)
  • Protection against human error (training, password management)
  • Continuous vulnerability assessment (ConnectSecure)
  • Strong patch management and configuration security (Datto ASM & Entra ID Backup)

Together, these tools form a robust, layered defence designed to protect customers against modern cyber threats while aligning our internal teams on a standardised, future‑proof security offering.

Read further information on Cyber Security

Ready to Secure Your Business?

Don’t wait until it’s too late. Contact EC Computers today for a cyber security assessment and discover how we can protect your business from evolving threats.

📞 Call us: 0117 200 1000
📧 Email: Contact-us form
🌐 Visit: https://eccomputers.co.uk/cyber-security/

Further reading: Top Cyber Security Tips for SMEs: Protect Your Business Today

Let’s Talk About You

Not quite sure where to start? Don’t worry, we have you covered. Contact us today to talk to a local specialist who can help pinpoint your requirements and how we can help.

Let's Talk About You

Not quite sure where to start? Don't worry, we have you covered. Contact us today to talk to a local specialist who can help pinpoint your requirements and how we can help.

"*" indicates required fields

Name*

Scroll to Top