Service Features |
|
|
|
|
|
|
Technological risk management | | | | | | |
Vulnerability analysis and management | | | | | | |
Incident Management | - | | | | | |
SIEM(Security Information and Event Management) | - | - | | | | |
Security breach management | | | | | | |
Asset Management (CMDB) | | | | | | |
Controls Management | - | | | | | |
Document management | - | - | | | | |
Profile management | | | | | | |
Scope of Service | | | | | | |
Business service creation | 2 | 4 | 10 | 15 | 20 | unlimited |
Asset range | 0-25 | 26-50 | 51-75 | 76-300 | 301-1000 | 1001-2000 |
Asset discovery | 1 | 2 | 4 | 10 | 20 | unlimited |
Number of network scans | 1 | 2 | 4 | unlimited | unlimited | unlimited |
Number of web scans | - | - | 2 | unlimited | unlimited | unlimited |
Send email alerts | sending alerts | sending alerts | sending alerts | sending alerts | sending alerts | sending alerts |
SIEM rules configuration | - | - | 8 | 12 | 20 | MITRE |
Security breach management | | | | | | |
Risk Matrix creation | - | - | 2 | 4 | 6 | 8 |
Meetings with the service manager | 1 | 2 | 4 | 4 | 4 | 6 |
Integration with external platforms, SIEM | - | - | 75 | 300 | 1000 | 2000 |
| Buy Now | | | | | |