Packages | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Network Detection and Response (NDR) | ||||
End-Point Detection and Response (EDR) | ||||
Application Detection and Response (ADR) | ||||
Performance Management & Auditing (PMA) | ||||
Business Continuity Management (BCM) | ||||
Log File Management System (LMS) | ||||
Sinkhole DNS (SHD) | ||||
DMARC Analyzer & Management (DAM) | ||||
Decoy & Deception Management (DDM) | ||||
Email Trap Analyzer (ETA ) | ||||
System Vulnerability Management (SVM) | ||||
Web Vulnerability Management (WVM) | ||||
Domain Vulnerability Management (DVM) | ||||
Security Information and Event Management (SIEM) | ||||
Remote Monitoring & Management (RMM) | ||||
Value Added Services |
Network Detection and Response (NDR) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Network Flow Monitoring (NFM) | ||||
Network Intrusion Detection Systems (NIDS) | ||||
Network Behavior Anomaly Detection (NBAD) | ||||
Alerting & Reporting (A&R) |
End-Point Detection and Response (EDR) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
EndPoint Identification, Tracking & Reporting | ||||
Host Intrusion Detection System (HIDS) | ||||
Regulatory compliances (PCI-DSS, HIPAA, GDPR, NIST, TSC SOC2) | ||||
Common Vulnerabilities Exposures CVE) & Common Weakness Enumeration (CWE) | ||||
MITRE ATT&CK® Threat detection | ||||
OS + 3rd party Vulnerabilities patching | ||||
Alerting & Reporting (A&R) |
Application Detection and Response (ADR) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Web Application Firewall (WAF) | ||||
Application Intrusion Detection System (APIDS) | ||||
OWASP TOP 10 | ||||
DOS prevention. | ||||
Alerting & Reporting (A&R) |
Performance Management & Auditing (PMA) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
System performance management (SPM) | ||||
System Auditing (SA) | ||||
Process & Log Monitor (PLM) | ||||
Alerting & Reporting (A&R) |
Business Continuity Management (BCM) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Host (Network/System) management (HDM) | ||||
Port (Application/Database) management (PDM) | ||||
WebApp (SSL+WebPerf) management (WDM) | ||||
Alerting & Reporting (A&R) |
Log File Managment System (LMS) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Server Log Managment (SML) | ||||
Network Log Managment (NLM) | ||||
Device Log Managment (DLM) | ||||
Alerting & Reporting (A&R) |
Sinkhole DNS (SHD) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Secure Private DNS | ||||
Adware, spyware, ransomware filtering | ||||
Trojans, Rootkits & BOT blocking | ||||
Alerting & Reporting (A&R) |
DMARC Analyzer & Management (DAM) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
DMARC Analyzer | ||||
DKIM Analyzer | ||||
SPF Analyzer | ||||
Alerting & Reporting |
Decoy & Deception Management (DDM) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Network & System Decoys | ||||
App & Database Decoys | ||||
Email RDP & SSH Decoys | ||||
Mobile and Endpoints | ||||
Alerting & Reporting (A&R) |
Email Trap Analyzer (ETA ) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Pristine trap | ||||
Recycled trap | ||||
Role-Based Traps | ||||
Alerting & Reporting (A&R) |
Security Information and Event Management (SIEM) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Data Classification | ||||
Data Retention | ||||
Triggered Alerts | ||||
Periodic Reports |
Remote Monitoring & Management (RMM) | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
Remote Desktop & Terminal | ||||
Role-Based Access Control | ||||
Real-Time User Interface with File Access | ||||
Multi-OS Support & Activity Logs |
Value Added Services | Basic | Standard | Premium | Ultimate |
---|---|---|---|---|
DDoS Simulation | ||||
Malware Removal | ||||
Network Hardening | ||||
End-point Hardening | ||||
Server Hardening | ||||
Application Tuning | ||||
Breach & Attack Simulation | ||||
Compromise Assessment | ||||
Managed 24/7 XOC Monitoring | ||||
Virtual CISO |
Copyright © 2024 | All Rights Reserved