Protection Plans |
Cyber Protection Support Levels |
Capabilities Included: |
1 |
2 |
3 |
4 |
Endpoint Protection: Endpoint protection refers to securing the various devices (like computers and mobile phones) that connect to a network. |
✓ |
✓ |
✓ |
✓ |
Endpoint Detection and Response: This involves not only detecting threats on connected devices but also responding to them, like isolating a compromised device. |
✓ |
✓ |
✓ |
✓ |
Digital Assets Discovery: This is about finding and identifying all digital assets (like software and data) within an organization. |
✓ |
✓ |
✓ |
✓ |
Digital Assets Integration: This refers to effectively combining and utilizing digital assets (software, data, etc.) within an organization's systems. |
✓ |
✓ |
✓ |
✓ |
Vulnerability and Risk Management: Identifying, assessing, and mitigating security risks and weaknesses in an organization’s systems. |
✓ |
✓ |
✓ |
✓ |
Vulnerability and Risk Management: Identifying, assessing, and mitigating security risks and weaknesses in an organization’s systems. |
✓ |
✓ |
✓ |
✓ |
24/7 Security Operations Center (SOC) Support: This is a dedicated team working around the clock to monitor and respond to security threats against an organization. |
✓ |
✓ |
✓ |
✓ |
Employees Security Awareness Training: Training provided to employees to make them aware of security risks and safe practices. |
|
✓ |
✓ |
✓ |
Phishing Awareness Training: Training employees to recognize and avoid phishing, which is a type of online scam where emails are used to steal information. |
|
✓ |
✓ |
✓ |
Email Inbox Security: Protecting email inboxes from threats like spam, phishing, and malware. |
|
✓ |
✓ |
✓ |
Secure Email Gateway: A system that monitors and protects an organization's email flow for security threats. |
|
✓ |
✓ |
✓ |
Backup Capabilities: Storing copies of emails and server data either online (in the cloud) or onsite (on-premises) for safety. |
|
|
✓ |
✓ |
DNS Protection and Filtering: Securing the Domain Name System (DNS) which translates website names into IP addresses, and filtering out harmful or unwanted content. |
|
|
✓ |
✓ |
Complete Disaster Recovery and Business Continuity Backup Solution: A comprehensive plan and system for data backup and recovery to ensure business operations can continue after a major incident. |
|
|
|
✓ (Price Per GB) |
Security Incident and Events Management System: A system for collecting and analyzing data on security incidents and events to manage and mitigate potential threats. |
|
|
|
✓ |
Incident Response Management:
Incident response management is the process of handling and resolving a security breach or cyberattack within an organization, focusing on effectively managing the situation to limit damage and reduce recovery time and costs. |
|
|
|
✓ |
Value of Cyber Protection |
|
|
|
|
Once off set up |
$295 |
$395 |
$495 |
$595 |
Monthly Per User |
$27.50 |
$39.50 |
$43.40 |
$52.50 |
Special 90 Day Offer |
|
|
|
|
Once Off Set Up |
$145 |
$260 |
$325 |
$345 |
Monthly Per User |
$11.95 |
$22.30 |
$25.60 |
$31.80 |