CornerstoneProtect ensures you always meet the required levels for Cyber Essentials, hardens your endpoints, provides email and 365 security, protects and educates staff against threats and proactively monitors your network.
Cyber Essentials
Defender
Vulnerability Scans
Hardware Patching & Updates
Training
Sensitive Data Recovery
Dark Web Monitoring
Patch Management
Asset Management
Phishook
Train Users To Understand And Respond Correctly To The Latest Phishing Techniques
The first key to preventing email fraud is recognising subtle phishing clues. Cornerstone Phishook transforms employees into a powerful line of defence against damaging phishing attacks.
Your current Simulated Phishing solution is a mostly manual solution which requires our engineers to build the campaigns and deploy. We then need to create a report to send to relevant contacts.
We recommend replacing this with Phishook which is fully automated and also includes ongoing training.

Total Email Protection
Back up your Microsoft 365 Teams, Groups, Exchange, SharePoint, OneDrive, and OneNote, as well as Entra ID data, and find and recover the exact data you want quickly and easily with advanced search.
99.2% of phishing attacks blocked without manual configuration
Targeted attacks are increasing in their complexity and ability to evade traditional defenses. The need for a comprehensive, proactive, and smart email security solution has never been more urgent.
Protect your users and business from volumetric threats, such as malware and spam, as well as advanced threats, including ransomware and zero-day attacks.
Detect and remediate account takeover using AI. Protect your business and employees from account takeover attempts and attacks launched from compromised accounts.
Cornerstone Protect | Cornerstone Protect Plus | |
Business Premium | ✓ | ✓ |
Barracuda TEP | ✓ | ✓ |
Continuation of compliance for Cyber Essentials | ✓ | ✓ |
Ongoing Vulnerability Scans | ✓ | ✓ |
Hardware Vulnerabilities monitored and addressed | ✓ | ✓ |
Patch Management | ✓ | ✓ |
Defender Vulnerabilities and Notifications | ✓ | ✓ |
Provides high level cyber security training | ✓ | ✓ |
Simulated Phishing Campaigns | ✓ | ✓ |
Phishing Training | ✓ | ✓ |
Dark Web Monitoring | ✓ | ✓ |
Sensitive Data Discovery | ✓ | ✓ |
Account Take Over Protection | ✓ | ✓ |
Asset Management | ✓ | ✓ |
Cornerstone XDR / SOC (Email, Cloud, Endpoint, Network) | ✓ | |
DLP Policy Management | ✓ | |
DR Real Time Test and Restore | ✓ | |
Assigned Cyber Security Technical Account Manager | ✓ | |
Password Manager | ✓ |