Packages

Features

Summary

PackagesBasicStandardPremiumUltimate
Network Detection and Response (NDR)
End-Point Detection and Response (EDR)
Application Detection and Response (ADR)
Performance Management & Auditing (PMA)
Business Continuity Management (BCM)
Log File Management System (LMS)
Sinkhole DNS (SHD)
DMARC Analyzer & Management (DAM)
Decoy & Deception Management (DDM)
Email Trap Analyzer (ETA )
System Vulnerability Management (SVM)
Web Vulnerability Management (WVM)
Domain Vulnerability Management (DVM)
Security Information and Event Management (SIEM)
Remote Monitoring & Management (RMM)
Value Added Services
Note: Value Added Services Can be Offered as Standalone Service on a Case to Case Basis.

Security Operations Center (SOC)

Network Detection and Response (NDR)BasicStandardPremiumUltimate
Network Flow Monitoring (NFM)
Network Intrusion Detection Systems (NIDS)
Network Behavior Anomaly Detection (NBAD)
Alerting & Reporting (A&R)
End-Point Detection and Response (EDR)BasicStandardPremiumUltimate
EndPoint Identification, Tracking & Reporting
Host Intrusion Detection System (HIDS)
Regulatory compliances (PCI-DSS, HIPAA, GDPR, NIST, TSC SOC2)
Common Vulnerabilities Exposures CVE) & Common Weakness Enumeration (CWE)
MITRE ATT&CK® Threat detection
OS + 3rd party Vulnerabilities patching
Alerting & Reporting (A&R)
Application Detection and Response (ADR)BasicStandardPremiumUltimate
Web Application Firewall (WAF)
Application Intrusion Detection System (APIDS)
OWASP TOP 10
DOS prevention.
Alerting & Reporting (A&R)

Network Operations Center (NOC)

Performance Management & Auditing (PMA)BasicStandardPremiumUltimate
System performance management (SPM)
System Auditing (SA)
Process & Log Monitor (PLM)
Alerting & Reporting (A&R)
Business Continuity Management (BCM)BasicStandardPremiumUltimate
Host (Network/System) management (HDM)
Port (Application/Database) management (PDM)
WebApp (SSL+WebPerf) management (WDM)
Alerting & Reporting (A&R)
Log File Managment System (LMS)BasicStandardPremiumUltimate
Server Log Managment (SML)
Network Log Managment (NLM)
Device Log Managment (DLM)
Alerting & Reporting (A&R)

Threat Operations Center (TOC)

Sinkhole DNS (SHD)BasicStandardPremiumUltimate
Secure Private DNS
Adware, spyware, ransomware filtering
Trojans, Rootkits & BOT blocking
Alerting & Reporting (A&R)
DMARC Analyzer & Management (DAM)BasicStandardPremiumUltimate
DMARC Analyzer
DKIM Analyzer
SPF Analyzer
Alerting & Reporting
Decoy & Deception Management (DDM)BasicStandardPremiumUltimate
Network & System Decoys
App & Database Decoys
Email RDP & SSH Decoys
Mobile and Endpoints
Alerting & Reporting (A&R)
Email Trap Analyzer (ETA )BasicStandardPremiumUltimate
Pristine trap
Recycled trap
Role-Based Traps
Alerting & Reporting (A&R)

Extended Operations Center (XOC)

Security Information and Event Management (SIEM)BasicStandardPremiumUltimate
Data Classification
Data Retention
Triggered Alerts
Periodic Reports

Remote Monitoring & Management (RMM)

Remote Monitoring & Management (RMM)BasicStandardPremiumUltimate
Remote Desktop & Terminal
Role-Based Access Control
Real-Time User Interface with File Access
Multi-OS Support & Activity Logs

Value Added Services

Value Added ServicesBasicStandardPremiumUltimate
DDoS Simulation
Malware Removal
Network Hardening
End-point Hardening
Server Hardening
Application Tuning
Breach & Attack Simulation
Compromise Assessment
Managed 24/7 XOC Monitoring
Virtual CISO