Protection Plans Cyber Protection Support Levels
Capabilities Included: 1 2 3 4
Endpoint Protection: Endpoint protection refers to securing the various devices (like computers and mobile phones) that connect to a network.
Endpoint Detection and Response: This involves not only detecting threats on connected devices but also responding to them, like isolating a compromised device.
Digital Assets Discovery: This is about finding and identifying all digital assets (like software and data) within an organization.
Digital Assets Integration: This refers to effectively combining and utilizing digital assets (software, data, etc.) within an organization's systems.
Vulnerability and Risk Management: Identifying, assessing, and mitigating security risks and weaknesses in an organization’s systems.
Vulnerability and Risk Management: Identifying, assessing, and mitigating security risks and weaknesses in an organization’s systems.
24/7 Security Operations Center (SOC) Support: This is a dedicated team working around the clock to monitor and respond to security threats against an organization.
Employees Security Awareness Training: Training provided to employees to make them aware of security risks and safe practices.
Phishing Awareness Training: Training employees to recognize and avoid phishing, which is a type of online scam where emails are used to steal information.
Email Inbox Security: Protecting email inboxes from threats like spam, phishing, and malware.
Secure Email Gateway: A system that monitors and protects an organization's email flow for security threats.
Backup Capabilities: Storing copies of emails and server data either online (in the cloud) or onsite (on-premises) for safety.
DNS Protection and Filtering: Securing the Domain Name System (DNS) which translates website names into IP addresses, and filtering out harmful or unwanted content.
Complete Disaster Recovery and Business Continuity Backup Solution: A comprehensive plan and system for data backup and recovery to ensure business operations can continue after a major incident. ✓ (Price
Per
GB)
Security Incident and Events Management System: A system for collecting and analyzing data on security incidents and events to manage and mitigate potential threats.
Incident Response Management: Incident response management is the process of handling and resolving a security breach or cyberattack within an organization, focusing on effectively managing the situation to limit damage and reduce recovery time and costs.
Value of Cyber Protection
Once off set up $295 $395 $495 $595
Monthly Per User $27.50 $39.50 $43.40 $52.50
Special 90 Day Offer
Once Off Set Up $145 $260 $325 $345
Monthly Per User $11.95 $22.30 $25.60 $31.80