Communication for Carriers, Consultants & VARs (Volume 8 Issue 9)

By Mark Stackpoole | September 30, 2020

Welcome to this edition of GTS DIRECTIONS, the monthly newsletter with updates and information for our family of over 200 VARs and referral partners, key carrier partners, and a dedicated team of in-house solution consultants. This month’s edition includes information on…

  • GTS Updates – News, Kudos, and Accolades
  • GTS Save The Date – Virtual Partner Sales Call Plus VIP Wine Tasting
  • Carrier Spotlight – Megaport
  • Product Spotlight – Endpoint Security Management (and more) via Cybersafe


GTS Updates – News, Kudos, and Accolades

It’s been such an exciting time recently for GTS! We would like to humbly share some things with our partner community and keep you abreast of recent happenings.

GTS GROWTH – 2020 is now officially a year of historic growth for GTS. We are excited to announce new hires that recently have joined the GTS team. Feel free to reach out if you would like additional information or an introduction to any of the new staff members:

  • Deb Rukat, Project Manager
  • Mandy Lintz, Channel Sales Manager
  • Kylah King, Channel Sales Manager

We are so proud to have attracted, as well as retained, such quality talent over the past few years. By early 2021, we will surpass 20 full-time employees. It is mind-blowing to think about how far we have come in the last decade. 2020 will be remembered forever, unfortunately for all the wrong reasons; that being said, we feel fortunate to have found some silver linings in a difficult

year. Thanks to our partner community for fueling the growth of the GTS rocket ship!

We wanted to take a moment to recognize the awesome efforts of several channel managers/service providers that have worked overtime to help fuel our 2020 success. There are so many providers that have stepped up and done an excellent job. A few of those that have gone above and beyond in the past few months: Jeremy Forrester(NEXTIVA), Travis Waye (CallHarbor), Heather Tokman (123.NET), Nichole Slating (AT&T), John Reed (For2Fi), Scott Minor (APX.NET), Hannah Pryfogle (Pax8), Phil Dawson (Dark Web Advisors), Dave Witt (NexVortex), Della Pretzer (RingCentral), John Komos (Vonage) and Brett Alexander (US Signal). Thanks to all of you, as well as all of our awesome carrier partners and channel managers that support us on an everyday basis.

Lastly, we are proud to announce that Global Telecom Solutions (GTS) has won the prestigious Best and Brightest Companies to Work For in Metropolitan Detroit! This is a testament to our amazing, dedicated staff. We sincerely thank you all for the continued support and are extremely humbled by the award and the growth that our company has been able to achieve during this challenging 2020


GTS Save The Date – Virtual Partner Sales Call Plus VIP Wine Tasting

Who: GTS Sales Partners (limited to first 12 respondents, so sign up quickly)
When: Thursday, October 29th, 4 – 6 p.m.
Where: ZOOM Call, details and invite will be sent prior to call with details
What: Join GTS for a one-hour virtual meeting, where we will catch up on new vendors, hot products, and solutions for 2020, as well as go over a few use cases that created mutual success stories for GTS partners and the end-user clients. After the one hour meeting, we will spend one (1) hour with a sommelier doing a VIP wine tasting for staff and sales partners. Thank you to Nextiva for
partnering with us to provide this. Wine will be shipped prior to the call for a taste and a toast for all to enjoy. Cheers!


Carrier Spotlight – Megaport

More and more customers are looking for better connectivity options to the Cloud. It needs to be fast. It needs to be scalable, yet reliable. Lastly, it needs to be cost-effective. Which provider checks all of those boxes? MEGAPORT. If your clients use cloud applications or are looking for options to connect global locations, data centers, global software, or hosting solutions, you need to work with GTS and set up a meeting to learn more about Megaport.


Product Spotlight — Endpoint Security Management (and more) via Cybersafe

We are excited to announce a new vendor that we have recently onboarded. Cybersafe provides an array of excellent
solutions that help enhance and bolster our offerings in areas such as intrusion detection, endpoint protection, and
SIEM management. Call your GTS channel manager to learn more and/or to set up a meeting with our Cybersafe
channel support team.


24/7/365 Endpoint Security Monitoring

When you are under attack, every second counts.

Fully managed endpoint security monitoring

Cybersafe monitors your endpoints in real-time to identify threats and respond immediately. We isolate and contain attacks before data is exfiltrated, assets are further compromised, or irreversible damage is done.

Cybersafe’s Endpoint Security Monitoring Service increases regulatory compliance and simplifies auditing for your organization.

Endpoints Are Prime Targets

Security for corporate desktops and laptops requires additional solutions beyond signature-based Anti-Virus, DLP, and Anti-Malware tools. Almost 40% of today’s successful breaches begin with an endpoint attack.

Endpoint detection and response tools provide complete visibility into activity and are excellent supplements to traditional desktop protection.

Via a single endpoint platform, Cybersafe can monitor and protect all of your laptops, desktops, servers, and virtual environments, with support for all major operating systems. Cybersafe’s comprehensive platform is an ideal solution for protecting enterprises’ sensitive data from the ever-expanding threat landscape.


Take Control of Endpoint Security

  • Zero-Day Attack Protection
    We understand patterns of attack behavior and employ advanced behavioral analytics to detect and contain endpoint attacks.
  • Continuous Recording
    Complete visibility into endpoint activity allows us to quickly pinpoint attacks and address gaps in defenses.
  • Threat Intelligence
    Cybersafe works tirelessly with security professionals around the globe to identify new and emerging threats that target your endpoints.
  • Containment
    This is a customized service that focuses on detection AND contains live attacks to stop adversaries in their tracks.
  • Threat Banning
    Our team proactively bans the execution of known malicious files, stopping attacks before they begin.


Access Cybersafe’s senior-level security experts with 20+ years of experience and a state-of-the-art Security Operations Center.
For more information, call 1-800-897-CYBER (2923)


Cybersafe Endpoint Security Monitoring Features And Offerings:

Cybersafe has successfully responded to targeted attacks on our clients’ endpoints. Our continuous recording and monitoring platform provides full visibility across the enterprise, enabling our analysts to determine the following:

  • Adversaries, Tactics, Techniques, and Procedures (TTPs)
  • Systems under attack
  • Identification of command-and-control (C&C) servers
  • Other endpoints where the same malware was spreading
  • All IP addresses and domain names associated with the malware
  • Reconnaissance activities of the attacker and which accounts the attacker was trying to access

Cybersafe Endpoint Security Monitoring Methodology

Our team’s approach to Endpoint Security Monitoring incorporates the full security lifecycle of Prevention, Detection, and Incident Response. Prevention alone is no longer an effective security strategy. Cybersafe’s security experts focus on detection in addition to prevention in order to keep your assets safe.

Cybersafe analysts utilize state-of-the-art detection and response tools that rapidly detect and contain threats before any damage occurs.

By proactively monitoring and recording all activity on endpoints and servers, our responders reduce the cost of incident response while also decreasing the dwell time of targeted threats through instant attack intervention and remediation.


Detect Network Threats Anywhere

Network & Cloud Security Monitoring

The threat landscape is expanding, exposing new vulnerabilities as more and more businesses shift their information and data to cloud networks. A 24/7/365 cybersecurity monitoring solution—focused on managed detection, response, and containment—provides peace of mind, ensures compliance, and gives you an answer to that all-important question: If your network or cloud was breached, would you be ready?

With Cybersafe, you’re prepared at all times.

Integrations, Constant Visibility & Real-Time Alerts

Get cloud visibility into all of your on-premises and cloud environments while Cybersafe provides centralized cloud security management, analysis, correlation, detection, and live alerts.


Five Essential Tools In One Solution

Relying on a state-of-the-art security operations center and the leading experts in the industry, Cybersafe unifies 5 essential security tools into one integrated solution powered by a global threat intelligence network.

  • Asset Discovery & Inventory
    • Find all assets on your network before a bad actor does with active and passive network discovery.
  • Vulnerability Assessment
    • Identify systems that are vulnerable to exploits with active network scanning & continuous vulnerability monitoring.
  • Intrusion Detection
    • Detect known threats and attack patterns targeting your assets. Cybersafe monitors your on-premise and cloud networks looking for signs of attack, compromise, and other exposures.
  • Behavioral Monitoring
    • Instantly spot suspicious network behavior with NetFlow analysis, service monitoring, and deep packet analysis.
  • SIEM & Log Management
    • Quickly correlate & analyze security event data from across your network with built-in SIEM & log management.