Cybersecurity & Managed IT Services for Marketing Company
- Cybersecurity IT Managed Services
- Confidential
- Jan. 2024 - Ongoing
- Quality
- 5.0
- Schedule
- 5.0
- Cost
- 5.0
- Willing to Refer
- 5.0
"Everything has been delivered to the highest standard."
- Advertising & marketing
- Chicago, Illinois
- 11-50 Employees
- Online Review
- Verified
Reboot, Inc. provides cybersecurity and IT management services for a marketing company. The team is responsible for risk assessment, vulnerability management, incident response, and security training.
Reboot, Inc.'s work has helped the client reduce incident response times and security incidents. The team's combination of deep technical expertise and genuine partnership stood out. Reboot, Inc. is highly structured and transparent. They adhere to timelines and proactively update the client.
The client submitted this review online.
BACKGROUND
Please describe your company and position.
I am the Founder & CEO of a marketing company.
Describe what your company does in a single sentence.
Marketing company
OPPORTUNITY / CHALLENGE
What specific goals or objectives did you hire Reboot, Inc. to accomplish?
- IT Support & Management
- Cybersecurity
SOLUTION
How did you find Reboot, Inc.?
Referral
Why did you select Reboot, Inc. over others?
- High ratings
- Close to my geographic location
- Pricing fit our budget
- Great culture fit
- Good value for cost
How many teammates from Reboot, Inc. were assigned to this project?
2-5 Employees
Describe the scope of work in detail. Please include a summary of key deliverables.
Security Policies & Procedures:
Information Security Policy
Acceptable Use Policy
Data Classification & Handling Policy
Remote Access Policy
Bring Your Own Device (BYOD) Policy
Risk Assessment & Management:
Risk Assessment Report (includes threat identification and risk mitigation strategies)
Risk Treatment Plan
Network & System Documentation:
Network Architecture Diagrams
System Topology Documentation
Configuration Standards & Hardening Guidelines (firewalls, routers, servers, etc.)
Vulnerability Management Artifacts:
Vulnerability Scan Reports (internal, external, web application)
Patch Management Plan & Schedule
Penetration Testing Materials:
Penetration Testing Scope & Test Plan
Final Penetration Test Report & Findings
Remediation Action Plan
Incident Response & Business Continuity:
Incident Response Plan (IRP)
Disaster Recovery Plan (DRP)
Business Continuity Plan (BCP)
Security Incident Log & Reporting Templates
Security Awareness & Training:
Employee Security Training Modules (phishing, social engineering, etc.)
Compliance Training Records & Certificates
Audit & Compliance Documentation:
Internal Audit Reports
Compliance Checklists (PCI DSS, HIPAA, SOC 2, ISO 27001, etc.)
Evidence of Controls & Implementation
Access Control & Identity Management:
Access Control Policy
Role-Based Access Control (RBAC) Matrix
User Provisioning & De-Provisioning Procedures
SIEM & Monitoring Deliverables:
Security Information and Event Management (SIEM) Implementation Plan
Log Management & Analysis Reports
Monitoring Dashboards & Alerts Configuration
Encryption & Key Management:
Encryption Policy & Standards (data at rest, data in transit)
Key Management Procedures
Endpoint Security & Software Deployments:
Endpoint Protection/Antivirus Deployment Plan
Endpoint Compliance Reports (device patch levels, antivirus status, etc.)
Cloud Security Deliverables:
Cloud Security Architecture Diagram
Cloud Access Security Broker (CASB) Implementation Plan
Cloud Configuration Compliance Reports
Physical Security Artifacts:
Physical Security Assessment Report (badge access, cameras, onsite audits)
Security Layout & Controls Blueprint
Vendor & Third-Party Security:
Vendor Risk Assessments
Service Level Agreements (SLAs) & Security Requirements
Vendor Security Compliance Reports
Backup & Recovery Documentation:
Data Backup Strategy & Procedures
Backup Testing & Verification Report
Recovery Time Objectives (RTO) & Recovery Point Objectives (RPO)
Threat Intelligence & Security Roadmap:
Threat Intelligence Reports (emerging threats, trending vulnerabilities)
Cybersecurity Roadmap (short-term & long-term initiatives)
Project-Specific Deliverables:
Statement of Work (SOW) with Security Requirements
Proof of Concept (POC) Reports for new security tools
Implementation Plans & Post-Implementation Reviews
RESULTS & FEEDBACK
What were the measurable outcomes from the project that demonstrate progress or success?
Reduced Incident Response Times
Example Metric: Incident response and containment times drop by 40% after implementing and practicing an Incident Response Plan (IRP).
Fewer Security Incidents
Example Metric: Annual number of security incidents decreases by 50% following regular vulnerability scans, patch management, and continuous monitoring.
Lower Compliance Audit Findings
Example Metric: Internal or external audit noncompliance issues are reduced from 15 findings per year to only 2 after implementing standardized policies and controls.
Increased Operational Efficiency
Example Metric: IT staff spend 30% less time manually tracking security issues due to automated SIEM alerts and improved dashboard reporting.
Example Metric: Security configuration reviews drop from 5 days to 2 days, thanks to centralized system topology documentation and standardized configurations.
Reduced Downtime & Faster Recovery
Example Metric: Average downtime for critical systems is cut in half (from 4 hours to 2 hours) by having a well-documented disaster recovery plan and regular testing.
Example Metric: Recovery time from ransomware infection improves from 3 days to 8 hours by implementing tested backup and restoration procedures.
Time Saved on Patch Management
Example Metric: Patch deployment cycle time is reduced from monthly to weekly with 90% endpoint patch compliance, thanks to an automated patch management plan.
Lower Cost of Security Operations
Example Metric: Overall security operations expenses decrease by 20% because of reduced incident remediation costs and better vendor security integrations.
Improved Employee Security Awareness
Example Metric: Phishing click-through rate among staff drops from 15% to 2% after rolling out mandatory security awareness training modules.
Higher ROI on Security Investments
Example Metric: Investments in new security tools (e.g., CASB, SIEM) yield a 25% return through avoided incident costs, faster detection, and less manual work.
Enhanced Customer & Stakeholder Trust
Example Metric: Customer satisfaction scores increase by 10% because of improved compliance posture and lower risk of data breaches.
Example Metric: Sales conversion rates increase by 5% when clients see verifiable security certifications or reports (e.g., SOC 2, ISO 27001).
Describe their project management. Did they deliver items on time? How did they respond to your needs?
Their project management was highly structured and transparent. They adhered closely to agreed-upon timelines, proactively updating us on each milestone’s status and promptly communicating any potential setbacks. Whenever new or urgent needs arose, they were responsive and flexible, adjusting resources as necessary to meet changing priorities. The regular progress check-ins and detailed reports helped ensure deliverables were consistently delivered on time, meeting or exceeding our expectations.
What was your primary form of communication with Reboot, Inc.?
- In-Person Meeting
- Virtual Meeting
- Email or Messaging App
What did you find most impressive or unique about this company?
Their combination of deep technical expertise and genuine partnership stood out the most. They not only brought a wealth of cybersecurity knowledge to the table but also made an effort to understand our specific challenges and tailor solutions accordingly. This blend of cutting-edge skills with a personalized approach is what truly set them apart.
o1
Are there any areas for improvement or something Reboot, Inc. could have done differently?
Nothing that comes to mind at this point. Everything has been delivered to the highest standard, and there were no gaps or overlooked areas that I noticed.
RATINGS
-
Quality
5.0Service & Deliverables
-
Schedule
5.0On time / deadlines
-
Cost
5.0Value / within estimates
-
Willing to Refer
5.0NPS