Nachdem Sie Ihre Bestellung aufgegeben haben, setzen wir uns mit Ihnen in Verbindung und helfen Ihnen beim Onboarding.
- Einfache Installation in wenigen Minuten.
- Schützen Sie alle Geräte rund um die Uhr mit einer führenden Cybersecurity-Software.
- Stoppen Sie Angriffe, die von herkömmlichen Antivirenprogrammen nicht erkannt werden.
- Stoppen Sie Ransomware mit nur ein paar Klicks.
| FUNCTIONS | Elite | All in One | ||
|---|---|---|---|---|
| Platform | ||||
| Sites, Groups, Policy Audit Management | ||||
| Users, Roles, MFA SSO Management | ||||
| License Usage Management | ||||
| Dashboard Reports | ||||
| API, RMM PSA Integrations | ||||
| Endpoint Protection Platform (EPP) | ||||
| MITRE ATT@CK Integration | ||||
| NextGen Antivirus | ||||
| Threat Intelligence, Ransomware Malware Protection | ||||
| Exploit Critical OS Components Protection | ||||
| Credential, Files Documents Protection | ||||
| Device Control | ||||
| End User Controls Dashboard | ||||
| Endpoint Detection And Response (EDR) | ||||
| Windows Event Visibility | ||||
| Network, File Process Event Visibility | ||||
| Application Endpoint Visibility | ||||
| Threat Hunting | ||||
| Forensic Automated Investigations | ||||
| Custom Detection Policies | ||||
| Send To Sandbox | ||||
| Automated Investigation Remediation | ||||
| Secure Remote Shell | ||||
| Endpoint Security Posture Management (ESPM) | ||||
| Endpoint Misconfiguration Detection Remediation | – | |||
| Detect Vulnerable Apps Across Endpoints (CVE) | – | |||
| Mobile Threat Detection (MTD) | ||||
| Device, Network, Apps Phishing Threat Detection | + | |||
| On-Device Remediation | + | |||
| Mobile App Risk Detection Mitigation | + | |||
| iOS, Android Chrome OS Devices | + | |||
| Network Detection and Response (NDR) | ||||
| Network Scan Detection | ||||
| Network Poisoning Detection | ||||
| Tunnel Exfiltration Detection | ||||
| Domain Filtering | + | |||
| External Attack Surface Management / Port Scan | + | |||
| User Behavior Analytics (UBA) | ||||
| User Visibility | ||||
| Lateral Movement Detection | ||||
| Anomaly Detection | ||||
| Deception | ||||
| Deceptive Endpoints & Servers | ||||
| Deceptive Files & Documents | ||||
| Deceptive Users | ||||
| Email Security | ||||
| Integration With Office 365 | – | |||
| Phishing Malware Email Detection Remediation | – | |||
| Unauthorized Senders Management | – | |||
| Safe URLs | – | |||
| SaaS & Cloud Security Posture Management (SSPM & CSPM) | ||||
| Security Misconfiguration Detection Remediation | + | |||
| Compliance Management | + | |||
| Notifications Reports | + | |||
| Cloud Users Resource Inventory | + | |||
| Centralized Log Management (CLM) and Open XDR | ||||
| Native 3rd Party Forensic Data HOT Retention | + | |||
| Native 3rd Party Forensic Data COLD Retention | + | + | ||
| Forensic Investigations Across Data Sources | + | |||
| Correlated Alerts Across Data Sources (XDR) | + | |||
| SOAR (Security Orchestration, Automation and Response) | ||||
| Automated Response Actions Playbooks | ||||
| Customized Playbooks | ||||
| API 3rd Party Integrations | + | |||
| Services | ||||
| Enterprise Support | ||||
| CyOps 24/7 MDR including sending files to analyst | ||||
| Onboarding Installation | ||||
| CyOps Platinum Care MDR Services | + | + | ||
| CyOps Platinum Monthly Threat Intel Report | + | |||
| CyOps Platinum Credentials Theft Monitoring | + | + | ||
| Ransomware Warranty | + | |||


