Nachdem Sie Ihre Bestellung aufgegeben haben, setzen wir uns mit Ihnen in Verbindung und helfen Ihnen beim Onboarding.
- Einfache Installation in wenigen Minuten.
- Schützen Sie alle Geräte rund um die Uhr mit einer führenden Cybersecurity-Software.
- Stoppen Sie Angriffe, die von herkömmlichen Antivirenprogrammen nicht erkannt werden.
- Stoppen Sie Ransomware mit nur ein paar Klicks.
FUNCTIONS | Elite | All in One | ||
---|---|---|---|---|
Platform | ||||
Sites, Groups, Policy Audit Management | ||||
Users, Roles, MFA SSO Management | ||||
License Usage Management | ||||
Dashboard Reports | ||||
API, RMM PSA Integrations | ||||
Endpoint Protection Platform (EPP) | ||||
MITRE ATT@CK Integration | ||||
NextGen Antivirus | ||||
Threat Intelligence, Ransomware Malware Protection | ||||
Exploit Critical OS Components Protection | ||||
Credential, Files Documents Protection | ||||
Device Control | ||||
End User Controls Dashboard | ||||
Endpoint Detection And Response (EDR) | ||||
Windows Event Visibility | ||||
Network, File Process Event Visibility | ||||
Application Endpoint Visibility | ||||
Threat Hunting | ||||
Forensic Automated Investigations | ||||
Custom Detection Policies | ||||
Send To Sandbox | ||||
Automated Investigation Remediation | ||||
Secure Remote Shell | ||||
Endpoint Security Posture Management (ESPM) | ||||
Endpoint Misconfiguration Detection Remediation | – | |||
Detect Vulnerable Apps Across Endpoints (CVE) | – | |||
Mobile Threat Detection (MTD) | ||||
Device, Network, Apps Phishing Threat Detection | + | |||
On-Device Remediation | + | |||
Mobile App Risk Detection Mitigation | + | |||
iOS, Android Chrome OS Devices | + | |||
Network Detection and Response (NDR) | ||||
Network Scan Detection | ||||
Network Poisoning Detection | ||||
Tunnel Exfiltration Detection | ||||
Domain Filtering | + | |||
External Attack Surface Management / Port Scan | + | |||
User Behavior Analytics (UBA) | ||||
User Visibility | ||||
Lateral Movement Detection | ||||
Anomaly Detection | ||||
Deception | ||||
Deceptive Endpoints & Servers | ||||
Deceptive Files & Documents | ||||
Deceptive Users | ||||
Email Security | ||||
Integration With Office 365 | – | |||
Phishing Malware Email Detection Remediation | – | |||
Unauthorized Senders Management | – | |||
Safe URLs | – | |||
SaaS & Cloud Security Posture Management (SSPM & CSPM) | ||||
Security Misconfiguration Detection Remediation | + | |||
Compliance Management | + | |||
Notifications Reports | + | |||
Cloud Users Resource Inventory | + | |||
Centralized Log Management (CLM) and Open XDR | ||||
Native 3rd Party Forensic Data HOT Retention | + | |||
Native 3rd Party Forensic Data COLD Retention | + | + | ||
Forensic Investigations Across Data Sources | + | |||
Correlated Alerts Across Data Sources (XDR) | + | |||
SOAR (Security Orchestration, Automation and Response) | ||||
Automated Response Actions Playbooks | ||||
Customized Playbooks | ||||
API 3rd Party Integrations | + | |||
Services | ||||
Enterprise Support | ||||
CyOps 24/7 MDR including sending files to analyst | ||||
Onboarding Installation | ||||
CyOps Platinum Care MDR Services | + | + | ||
CyOps Platinum Monthly Threat Intel Report | + | |||
CyOps Platinum Credentials Theft Monitoring | + | + | ||
Ransomware Warranty | + |