Small Business & Merchants

Perfect for smaller companies

that don't have an IT department

For example – franchisees, restaurants, hair & nail salons, day-spas, e-commerce, independent retailers, etc.

Don’t have an in-house IT Department? Intersec Worldwide Gold, Silver, Platinum and PCI Compliance Managed Services Packages take the headache out of IT tasks. We will manage the security of your infrastructure and help you offload many of your day-to-day information technology responsibilities, while reducing your costs, simplifying complicated tasks and meeting your compliance requirements from a single platform.

Supports up to 20 megabit firewall speed
Supports up to 200 megabit firewall speed
Faster connections – Supports up to 1 gigabit firewall speed
Faster Connections – Supports up to 1 gigabit firewall speed
Firewall included with 36 month service agreement
Full UTM (Unified Threat Management – Firewall, IPS, Anti-Virus and Web Filtering)
Secure configuration and operation of firewall
Automatic text or email notifications of suspicious activity
Centralized management and monthly reporting
Automatic updates
Application control
Firewall support M-F. 9-5 MST
Anti-Spyware and Anti-Spam*
Customer Wi-Fi Access (hotspot)
Network monitoring
Data leak protection
Data loss prevention
Centralized management and weekly reporting
Intrusion prevention
Web content filtering
VPN access – support for up to 2 VPN users
WAN optimization
2-Factor authentication
Vulnerability Remediation Support
Gateway to gateway VPN tunnels and support
Centralized management and optional daily reporting
24/7 phone support
Business-grade wireless security – support of up to four wireless access points – gives maximum Wifi coverage of medium and large locations
File Integrity Monitoring
Employee Security Awareness Training
VPN Access – support for up to 20 VPN users
PCI SAQ completion & review – Annual
PCI security policy templates – use the templates to draft your required PCI security policies
Internal and External ASV Scanning (Required Quarterly)
PCI Penetration Testing (Required annually)
PCI Security Policy Management – Complete guidance and support through annual PCI required SAQ and documentation process

2-Factor Authentication

More than just putting in your password, two-factor authentication is commonly found in electronic computer authentication, where basic authentication is the process of a requesting entity presenting some evidence of its identity to a second entity. 2-Factor Authentication incorporates a knowledge factor, “something only the user knows,” and a possession factor, “something only the user has.” Two-factor authentication seeks to decrease the probability that the requester is presenting false evidence of its identity.

Anti-spyware, Anti-Spam, Anti-Virus

Multi-layered, real-time protection against both new and evolving virus, spyware, and other types of malware attacks in web, email, and file transfer traffic. Stop malware infections in networks, servers and endpoint devices which can cost you money. It also takes time to remove viruses from endpoints and servers, while your organization can lose valuable and sensitive data through spyware and bots that send information undetected from inside the network perimeter to outside command and control servers. In addition, some viruses are capable of taking down your entire network or deleting critical information from servers and databases.

Application Control

Enables you to define and enforce policies for thousands of applications running across networks regardless of port or the protocol used for communication. The explosion of new Internet-based and Web 2.0 applications such as Facebook, Twitter and Skype are increasing the volume and complexity of your network traffic, and exposing your organization to a new generation of web-based threats and malware. Application Control enables you to control more than 2,400 different Web-based applications, software programs, network services and network traffic protocols.

ASV Scanning

Internal & External (Quarterly – runs automatically after setup) – All vendors and merchants that must abide by PCI compliance regulations are required to perform quarterly vulnerability scans of their external PCI network. ASV Scanning is a fully automated, certified PCI scan service that enables organizations to achieve PCI compliance and improve their overall network security. The PCI Scan Service requires no hardware or software to be installed and managed.

Automatic Updates

Coming soon.

Business Grade Wireless Security

Coming soon.

Centralized Management & Reporting (Monthly, Weekly or Optional Daily)

Coming soon.

Customer Wi-Fi Access (hot spot)

a hotspot allows businesses to offer internet access to their customers over a wireless local area network (WLAN) through the use of a router connected to a link to an Internet service provider.

Data Leak Protection

Coming soon.

Gateway to Gateway VPN Tunnels & Support

Coming soon.

Data Loss Prevention (DLP)

system sensors provide a central location to you to configure and store desired DLP features, and can be used to specify parameters such as document file fingerprints, document file sources, inspection modes, enhanced pattern matching, and archiving preferences. DLP uses sophisticated pattern matching techniques and user identity to detect and prevent unauthorized communication of sensitive information and files through the network perimeter. You can also enable content archiving to store a record of all content, or selected content that passes through your firewall.

Employee Security Awareness Training

Courses and training materials to help your employees meet regulatory and compliance requirements such as PCI-DSS, GLBA, and HIPPA/HITECH. Our curriculum stresses proper security controls in addition to employee responsibilities for ensuring your organizations security protocols are strictly adhered to.

File Integrity Monitoring

File Integrity Monitoring is an internal control or process performs the act of validating the integrity of operating system and application files using a verification method between the current file state and the known, good baseline. This comparison method often involves calculating a known cryptographic checksum the file’s original baseline and comparing with the calculated checksum of the current state of the file. Other file attributes can also be used to monitor integrity. Changes to configurations, files and file attributes across the IT infrastructure are common, but hidden within a large volume of daily changes can be the few that impact file or configuration integrity. These changes can also reduce security posture and in some cases may be leading indicators of a breach in progress.

Firewall/UTM (Unified Threat Management)

Protect your network with the fastest firewall technology on the market and get the visibility you need to detect hidden threats within legitimate content, even from trusted sources and authorized applications. Firewalls are your first line of defense, protecting your internal systems from outside attackers by blocking access to services that should not be exposed outside of your network. Firewalls are consistently ranked as the most effective technology for protecting against attacks. The lack of a firewall is the most common contributing factor to security breaches. When coupled with regular vulnerability scanning, a firewall helps you secure your network and aides your organization in meeting any applicable PCI compliance requirements.


The Intrusion Detection/Intrusion Prevention Service monitors and protects against in-progress security attacks – the perfect complement to a managed firewall. With continuous monitoring and formal incident response processing, your organization receives a comprehensive threat management program. An IDS/IPS provides you with information to proactively detect complex traffic patterns, alerting you to malicious behavior and giving you the ability to respond to any impending attacks on your network. The IDS/IPS service blocks malicious attacks that could have otherwise resulted in a breach. The events generated by the IDS/IPS service are monitored by professional analysts 24/7 and are correlated against millions of other events generated across an expansive customer base.

Network Monitoring

is a system that constantly monitors your computer network for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages. A network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices.

PCI Penetration Testing (Annual)

Also called PEN Testing, is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.

PCI Security Policy Management

We provide you with security policy templates and guidelines that can be used to create a security policy specific to your organization. In addition we will review your completed policy documents to ensure compliance with PCI DSS requirements and review against industry best practices.

PCI Security Policy Templates

We provide templates that you can use to create your required PCI security policy documents.

SAQ Completion and Review

The PCI DSS SAQ (Self Assessment Questionnaire) is a required validation tool for merchants and service providers that are not required to undergo an on-site data security assessment per the PCI DSS Security Assessment Procedures. The purpose of the SAQ is to assist organizations in self-evaluating compliance with the PCI DSS, and you may be required to share it with your acquiring bank.

Secure Configuration & Operation of Firewall

Coming soon.

VPN Access

A VPN remote access service provides routing, encryption, authentication and data integrity for secure connectivity across the Internet and managed IP networks. You’ll realize the cost and performance advantages of a public network while maintaining the network security and control of a private network. A secure VPN allows your remote users, satellite offices, suppliers and customers to stay connected to your organization without putting your network, systems or information at risk via insecure communication. As an additional benefit, all data sent from the remote connection is checked for viruses, malware, spyware or other harmful elements before it enters your network. All traffic coming in through your VPN is scrubbed, adding an accompanying layer of security to a managed firewall or managed IDS/IPS service.

Vulnerability Remediation

additional cost (some hours included in Platinum package) Our team of experts work with you and your staff in performing remediation for any vulnerabilities discovered. This could include securing your website, reconfiguring your network, or fixing any other security issues.

WAN Optimization

A comprehensive solution for monitoring and securing network resources and bandwidth. WAN optimization reduces bandwidth usage between data centers and devices by applying advanced compression algorithm, data caching and other techniques to reduce the transmission of data. This results in more effective use of bandwidth, better application performance and reduces the high costs of WAN links between data centers.

Web Content Filtering

Web filtering protects endpoints, networks and sensitive information against web-based threats by preventing users from accessing known phishing sites and sources of malware. In addition, administrators can enforce policies based on website categories to easily prevent users from accessing inappropriate content and clogging networks with unwanted traffic.