After you place your order, we will contact you and help you with onboarding.
- Easy installation in just a few minutes.
- Protect all devices around the clock with leading cybersecurity software.
- Stop attacks that are not detected by traditional antivirus programs.
- Stop ransomware with just a few clicks.
FUNCTIONS | Elite | All in One | ||
---|---|---|---|---|
Platform | ||||
Sites, Groups, Policy & Audit Management | ||||
Users, Roles, MFA & SSO Management | ||||
License & Usage Management | ||||
Dashboard & Reports | ||||
API, RMM & PSA Integrations | ||||
Endpoint Protection Platform (EPP) | ||||
MITRE ATT@CK Integration | ||||
NextGen Antivirus | ||||
Threat Intelligence, Ransomware & Malware Protection | ||||
Exploit & Critical OS Components Protection | ||||
Credential, Files & Documents Protection | ||||
Device Control | ||||
End User Controls & Dashboard | ||||
Endpoint Detection And Response (EDR) | ||||
Windows Event Visibility | ||||
Network, File & Process Event Visibility | ||||
Application & Endpoint Visibility | ||||
Threat Hunting | ||||
Forensic & Automated Investigations | ||||
Custom Detection Policies | ||||
Send To Sandbox | ||||
Automated Investigation & Remediation | ||||
Secure Remote Shell | ||||
Endpoint Security Posture Management (ESPM) | ||||
Endpoint Misconfiguration Detection & Remediation | – | |||
Detect Vulnerable Apps Across Endpoints (CVE) | – | |||
Mobile Threat Detection (MTD) | ||||
Device, Network, Apps & Phishing Threat Detection | + | |||
On-Device Remediation | + | |||
Mobile App Risk Detection & Mitigation | + | |||
iOS, Android & Chrome OS Devices | + | |||
Network Detection and Response (NDR) | ||||
Network Scan Detection | ||||
Network Poisoning Detection | ||||
Tunnel Exfiltration Detection | ||||
Domain Filtering | + | |||
External Attack Surface Management / Port Scan | + | |||
User Behavior Analytics (UBA) | ||||
User Visibility | ||||
Lateral Movement Detection | ||||
Anomaly Detection | ||||
Deception | ||||
Deceptive Endpoints & Servers | ||||
Deceptive Files & Documents | ||||
Deceptive Users | ||||
Email Security | ||||
Integration With Office 365 | – | |||
Phishing & Malware Email Detection & Remediation | – | |||
Unauthorized Senders Management | – | |||
Safe URLs | – | |||
SaaS & Cloud Security Posture Management (SSPM & CSPM) | ||||
Security Misconfiguration Detection & Remediation | + | |||
Compliance Management | + | |||
Notifications & Reports | + | |||
Cloud Users & Resource Inventory | + | |||
Centralized Log Management (CLM) and Open XDR | ||||
Native & 3rd Party Forensic Data HOT Retention | + | |||
Native & 3rd Party Forensic Data COLD Retention | + | + | ||
Forensic Investigations Across Data Sources | + | |||
Correlated Alerts Across Data Sources (XDR) | + | |||
SOAR (Security Orchestration, Automation and Response) | ||||
Automated Response Actions & Playbooks | ||||
Customized Playbooks | ||||
API & 3rd Party Integrations | + | |||
Services | ||||
Enterprise Support | ||||
CyOps 24/7 MDR including sending files to analyst | ||||
Onboarding & Installation | ||||
CyOps Platinum Care MDR Services | + | + | ||
CyOps Platinum Monthly Threat Intel Report | + | |||
CyOps Platinum Credentials Theft Monitoring | + | + | ||
Ransomware Warranty | + |