Silver | Gold | Platinum | |
C2 Intelligence | Y | Y | Y |
IDS | Y | Y | Y |
Remote Forensics | Y | Y | Y |
End Point Scanner | Y | Y | Y |
Packet Capture | Y | Y | Y |
# of monitoring points | 1 | 3 | 6 |
# of hours included, per month | 20 | 40 | 80 |
Log Aggregation | FW, IDS, and AV | FW, IDS, and AV | FW, IDS, and AV |
Site Server Appliance | Included (1) | Included (1) | Included (1) |
Threat Intelligence License | 0 | 1 | 1 |
Malware Analysis | Included | Included | Included |
Active C2 Monitoring | Optional | Optional | Included |
Sandbox | Optional | Optional | Included |
Initial Triage Hours Included | 40 Hours | 40 Hours | 40 Hours |
- All in one, integrated solution provides all of the tools, including packet capture, IDS/IPS alerts, endpoint information, and forensic tools, needed to support your network investigative needs
- Datasurity Managed Services provide a fully managed option, staffed by Cyber Engineering Services trained and certified security analyst, which lets you focus on running your business and not reviewing logs and alert
- Flexible pricing and service options, enable you to purchase the service that meets the needs of your organization
- Very low customer to analyst ratio, allows our expert analysts to become more knowledgeable about your overall security posture and typical operating environment, allowing Cyber Engineering Services to more easily identify when there is a potential security problem in your environment
- Fully managed solution, from a single vendor, means there is only one organization responsible for the monitoring of your network, from service to hardware. This eliminates any finger pointing among vendors and allows for a seamless customer experience.