After you place your order, we will contact you and help you with onboarding.
- Easy installation in just a few minutes.
- Protect all devices around the clock with leading cybersecurity software.
- Stop attacks that are not detected by traditional antivirus programs.
- Stop ransomware with just a few clicks.
| FUNCTIONS | Elite | All in One | ||
|---|---|---|---|---|
| Platform | ||||
| Sites, Groups, Policy & Audit Management | ||||
| Users, Roles, MFA & SSO Management | ||||
| License & Usage Management | ||||
| Dashboard & Reports | ||||
| API, RMM & PSA Integrations | ||||
| Endpoint Protection Platform (EPP) | ||||
| MITRE ATT@CK Integration | ||||
| NextGen Antivirus | ||||
| Threat Intelligence, Ransomware & Malware Protection | ||||
| Exploit & Critical OS Components Protection | ||||
| Credential, Files & Documents Protection | ||||
| Device Control | ||||
| End User Controls & Dashboard | ||||
| Endpoint Detection And Response (EDR) | ||||
| Windows Event Visibility | ||||
| Network, File & Process Event Visibility | ||||
| Application & Endpoint Visibility | ||||
| Threat Hunting | ||||
| Forensic & Automated Investigations | ||||
| Custom Detection Policies | ||||
| Send To Sandbox | ||||
| Automated Investigation & Remediation | ||||
| Secure Remote Shell | ||||
| Endpoint Security Posture Management (ESPM) | ||||
| Endpoint Misconfiguration Detection & Remediation | – | |||
| Detect Vulnerable Apps Across Endpoints (CVE) | – | |||
| Mobile Threat Detection (MTD) | ||||
| Device, Network, Apps & Phishing Threat Detection | + | |||
| On-Device Remediation | + | |||
| Mobile App Risk Detection & Mitigation | + | |||
| iOS, Android & Chrome OS Devices | + | |||
| Network Detection and Response (NDR) | ||||
| Network Scan Detection | ||||
| Network Poisoning Detection | ||||
| Tunnel Exfiltration Detection | ||||
| Domain Filtering | + | |||
| External Attack Surface Management / Port Scan | + | |||
| User Behavior Analytics (UBA) | ||||
| User Visibility | ||||
| Lateral Movement Detection | ||||
| Anomaly Detection | ||||
| Deception | ||||
| Deceptive Endpoints & Servers | ||||
| Deceptive Files & Documents | ||||
| Deceptive Users | ||||
| Email Security | ||||
| Integration With Office 365 | – | |||
| Phishing & Malware Email Detection & Remediation | – | |||
| Unauthorized Senders Management | – | |||
| Safe URLs | – | |||
| SaaS & Cloud Security Posture Management (SSPM & CSPM) | ||||
| Security Misconfiguration Detection & Remediation | + | |||
| Compliance Management | + | |||
| Notifications & Reports | + | |||
| Cloud Users & Resource Inventory | + | |||
| Centralized Log Management (CLM) and Open XDR | ||||
| Native & 3rd Party Forensic Data HOT Retention | + | |||
| Native & 3rd Party Forensic Data COLD Retention | + | + | ||
| Forensic Investigations Across Data Sources | + | |||
| Correlated Alerts Across Data Sources (XDR) | + | |||
| SOAR (Security Orchestration, Automation and Response) | ||||
| Automated Response Actions & Playbooks | ||||
| Customized Playbooks | ||||
| API & 3rd Party Integrations | + | |||
| Services | ||||
| Enterprise Support | ||||
| CyOps 24/7 MDR including sending files to analyst | ||||
| Onboarding & Installation | ||||
| CyOps Platinum Care MDR Services | + | + | ||
| CyOps Platinum Monthly Threat Intel Report | + | |||
| CyOps Platinum Credentials Theft Monitoring | + | + | ||
| Ransomware Warranty | + | |||

