Collect and Centralize Security Events | |
---|---|
Unlimited Third-Party Integrations | |
Cloud Sensor Modules | |
1-Year Log Retention | |
Detect Cybersecurity Threats | |
Automated Threat Detection | |
Virtual Honeypot Sensors | |
Correlated Threat Intelligence | |
Threat Hunting | |
Evidence Stacking | |
Respond to Threats | |
Actionable Remediation Playbooks | |
Response Triage Prioritization | |
Customizable Threat Notifications | |
Automated Response | |
Firewall Dynamic Blocklists | |
Threat Feed Blocking | |
Community Intelligence Blocking | |
Reporting & Dashboards | |
Security & Management Dashboards | |
Operational Security Reporting | |
Compliance Reporting | |
Guided Report Generation | |
Monitoring & Availability | |
24x7 Service Availability | |
24x7 Sensor Monitoring | |
Offline Sensor Collection | |
Deployment & Support | |
Guided Onboarding | |
Speak with a Security Analyst | |
Phone Support | |
Email Support | |
Billing | |
*Billed annually | |
*100 user minimum | |
*Volume discounts available for 250+ users |