
Start protecting your business today, against cyber threats of tomorrow.
Our CORE offering builds on the LITE package and extends its features to incorporate cyber security framework elements to better understand, control and protect digital assets and network elements.
What Are The Benefits?
-
Fully-managed by Proactive Discovery's cyber team
-
Starting point for implementing a cyber resilience posture
-
Ongoing monitoring of digital assets for threats of tomorrow
-
Enables efforts to comply with HIPAA, PCI DSS, and similar compliance frameworks
L I T E
C O R E
P R O
Monthly subscription | Yes | Yes | Yes |
Full featured enterprise-grade Endpoint Detection & Response (EDR) | Yes | Yes | Yes |
Known malicious threat detection, protection, and remediation | Yes | Yes | Yes |
Suspicious threat detection and alerting | Yes | Yes | Yes |
Suspicious threat prevention | Yes | Yes | Yes |
Modern endpoint protection & Next-Generation AntiVirus (NGAV) utilizing static AI & behavioral AI to stop known and unknown threats | Yes | Yes | Yes |
100% cloud native (no equipment needed) | Yes | Yes | Yes |
Support of Windows, macOS, and Linux (including OSes no longer receiving vendor updates such as Windows XP, 7, 2003SP2, 2008, etc.) | Yes | Yes | Yes |
Fully managed by Proactive Discovery | Yes | Yes | Yes |
24/7/365 Security Operations Center (SOC) threat monitoring | Yes | Yes | Yes |
Installation & deployment service | # | Yes | Yes |
Application inventory | Yes | Yes | |
Identification of vulnerable applications | Yes | Yes | |
Threat detection / containment / remediation through Extended Detection and Response (XDR) | Yes | Yes | |
Ability to govern device interactions with networks, USB and Bluetooth devices | Yes | Yes | |
Central management of device firewall rules (Windows, MacOS, Linux) | Yes | Yes | |
Detection of rouge/unwanted devices inside network segments | Yes | Yes | |
Cyber risk assessment | Yes | ||
Technology & data use policy review | Yes | ||
Development of incident response plan | Yes | ||
Monthly external network vulnerability scans | Yes | ||
Monthly website vulnerability scans | Yes | ||
Asset inventory and prioritization | Yes | ||
Email phishing simulations | Yes | ||
Cyber security awareness training for staff | Yes | ||
#) Optional service; assistance available upon request. |
L I T E
C O R E
P R O
Subscription services listed above DO NOT include full scale incident response services. Incident response services are available separately.
RESOLUTE
SOLUTIONS
regain trust in your DIGITAL ASSETS
To build a sound foundation for a defense against cyber threats, it is necessary to understand the current network, the tactics of attackers, and the maturity level of a cyber risk mitigation program.
Performing proactive and continuous monitoring empowers your organization to determine if existing security efforts are successful. The ongoing 24/7/365 assessments can detect signs that an attacker has been bypassing existing perimeter defenses on endpoints like computers, laptops, servers, or virtual cloud infrastructure.
Having visibility into endpoint risk profiles within minutes gives you the advantage of focused threat containment and risk mitigation efforts.