Threat management offering

Foundation
(Typically 500 EPS)
Stan Standard
(Typically 1000-1500 EPS)
Premium
(Typically 1800-2500 EPS)
SIEM based 24x7 monitoring
ITSM with incident management
Use Case library aligned with MITRE attack framework
SOC KPI Dashboard Portal
Security orchestration Automated playbooks, Custom automated playbooks
Threat intelligence feed and Advisory
Malware Analysis
Threat Hunting
Behavioural Analytics
Brand Monitoring with Takedown
Threat Modelling
Incident Response and Forensics
Deep and Dark Web Monitoring
Deception
Foundation
(Typically 500 EPS)
Standard
(Typically 1000-1500 EPS)
Premium
(Typically 1800-2500 EPS)
Typical customer environment
500 eps OR
30 GB/Day OR
Less than 500 users
1000-2500 eps OR
55 GB/Day - 140 GB/Day OR
501-2000 users
2501-5000 eps OR
Up to 280 GB/Day OR
> 2000 users
SIEM based 24x7 monitoring Shared SPOC for escalated incidents Shared SPOC for escalated incidents Dedicated SPOC for escalated incidents
ITSM with incident management ITSM portal access Integration with customer ITSM supported Integration with customer ITSM supported
Log Retention
Online
Online
90 days
90/180/270 days supported
90 days
90/180/270 days supported
90 days
90/180/270 days supported
Use Case library aligned with MITRE attack framework Sysmon logs EDR and Sysmon enabled logs from servers Deception alerts, EDR and Sysmon enabled logs from servers
SOC KPI Dashboard Portal Full access to widget library Full access to widget library Full access to widget library
Security orchestration Automated playbooks, Custom automated playbooks 2 standard integrations 3 Standard integrations
2 Custom integrations
2 Custom playbooks
3 Standard integrations
2 Custom integrations
2 Custom playbooks
Threat intelligence feed and Advisory Free Feed Integration supported Deception based DNS attack monitoring
Malware Analysis 3 sample per quarter 5 sample per quarter 10 samples per quarter
Threat Hunting Once a week Daily (Logs, TI, UEBA) Daily (Logs, TI, UEBA And Deception)
Behavioural Analytics (UEBA) Using Logs and EDR Using Logs, EDR, Network and End Point Deception
Brand Monitoring with Takedown 10 takedowns a year
25 takedowns a year
200 takedowns a year
Unlimited takedowns
Threat Modelling Once a year Twice Annually
Incident Response and Forensics 50 Hours a Year 50 Hours a Year
Deep and Dark Web Monitoring STIX/TAXI Feed integration with SIEM
Deception Network, End Point
  • * - Includes Two network sensors and 1000 endpoint decoys
  • ** - Include access to Cyberrange training program for virtual hands on exercises to simulate Red team, Blue team exercises, Post Security Incident
  • *** - AD integration includedResponse process. On Demand metered access to Cyberrange virtual environment throughout the year