| BASIC | ADVANCE | PREMIUM |
|---|---|---|
| 30-Day Storage | 60-Day Storage | 180-Day Hot Storage |
| - | 6-Montd Log Storage | 12-Montd Log Storage |
| 8x5 Support | 24x7 Support | 24x7 Support |
| 8x5 Monitoring | 24x7 Monitoring | 24x7 Monitoring |
| - | - | Compliance Reports |
| On-Premise | AWS | Basic | Advance | Premium |
|---|---|---|---|---|
| INFRASTRUCTURE | ||||
| On-Premise | ||||
| AWS | ||||
| Azure | ||||
| GCP | ||||
| Private Cloud | ||||
| Network discovery, visibility and monitoring | NetFlow Analysis - Netflow, J-flow, S-flow and IPFIX | Full Packet Capture | User Behavior Analytics (UBA) | Data Exfiltration | Anomaly detection | BotNet Detection | IP, URL, and Domain Reputation Data | Malware patterns and signatures identification | Log analysis | Third Party Integration | Detect Command & Control (C&C) | Threat Hunting - abnormal communication, behavior, patterns, IoC, etc. | Dark web analysis | Advanced Threat Protection - Early warning indicators, and activities | Threat analysis reports | Incident Response |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| NETWORK DETECTION AND RESPONSE | ||||||||||||||||
| Network discovery, visibility and monitoring | ||||||||||||||||
| NetFlow Analysis - Netflow, J-flow, S-flow and IPFIX | - | |||||||||||||||
| Full Packet Capture | - | |||||||||||||||
| User Behavior Analytics (UBA) | - | |||||||||||||||
| Data Exfiltration | ||||||||||||||||
| Anomaly detection | - | |||||||||||||||
| BotNet Detection | ||||||||||||||||
| IP, URL, and Domain Reputation Data | ||||||||||||||||
| Malware patterns and signatures identification | ||||||||||||||||
| Log analysis | - | |||||||||||||||
| Third Party Integration | - | - | ||||||||||||||
THREAT INTELLIGECE AND MANAGEMENT | ||||||||||||||||
| Detect Command & Control (C&C) | - | |||||||||||||||
| Threat Hunting - abnormal communication, behavior, patterns, IoC, etc. | - | |||||||||||||||
| Dark web analysis | - | - | ||||||||||||||
| Advanced Threat Protection - Early warning indicators, and activities | - | |||||||||||||||
| Threat analysis reports | - | - | ||||||||||||||
| Incident Response | - | - | ||||||||||||||