BASIC | ADVANCE | PREMIUM |
---|---|---|
30-Day Storage | 60-Day Storage | 180-Day Hot Storage |
- | 6-Montd Log Storage | 12-Montd Log Storage |
8x5 Support | 24x7 Support | 24x7 Support |
8x5 Monitoring | 24x7 Monitoring | 24x7 Monitoring |
- | - | Compliance Reports |
On-Premise | AWS | Basic | Advance | Premium |
---|---|---|---|---|
INFRASTRUCTURE | ||||
On-Premise | ||||
AWS | ||||
Azure | ||||
GCP | ||||
Private Cloud |
Network discovery, visibility and monitoring | NetFlow Analysis - Netflow, J-flow, S-flow and IPFIX | Full Packet Capture | User Behavior Analytics (UBA) | Data Exfiltration | Anomaly detection | BotNet Detection | IP, URL, and Domain Reputation Data | Malware patterns and signatures identification | Log analysis | Third Party Integration | Detect Command & Control (C&C) | Threat Hunting - abnormal communication, behavior, patterns, IoC, etc. | Dark web analysis | Advanced Threat Protection - Early warning indicators, and activities | Threat analysis reports | Incident Response |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NETWORK DETECTION AND RESPONSE | ||||||||||||||||
Network discovery, visibility and monitoring | ||||||||||||||||
NetFlow Analysis - Netflow, J-flow, S-flow and IPFIX | - | |||||||||||||||
Full Packet Capture | - | |||||||||||||||
User Behavior Analytics (UBA) | - | |||||||||||||||
Data Exfiltration | ||||||||||||||||
Anomaly detection | - | |||||||||||||||
BotNet Detection | ||||||||||||||||
IP, URL, and Domain Reputation Data | ||||||||||||||||
Malware patterns and signatures identification | ||||||||||||||||
Log analysis | - | |||||||||||||||
Third Party Integration | - | - | ||||||||||||||
THREAT INTELLIGECE AND MANAGEMENT | ||||||||||||||||
Detect Command & Control (C&C) | - | |||||||||||||||
Threat Hunting - abnormal communication, behavior, patterns, IoC, etc. | - | |||||||||||||||
Dark web analysis | - | - | ||||||||||||||
Advanced Threat Protection - Early warning indicators, and activities | - | |||||||||||||||
Threat analysis reports | - | - | ||||||||||||||
Incident Response | - | - |