IDENTIFY
PROTECT
DETECT
RESPOND
RECOVER
WHATS INCLUDED IN OUR CYBERSHIELD MDR PACKAGES
Check out what’s included in our CYBERSHIELD MDR packages, whether you need security advisors, patch management, or any other cyber security solution we have you covered with one of our tailored CYBERSHIELD MDR packages.
For pricing check out our pricing calculator which can be found here
Defender |
Defender Plus |
Sentry |
Guardian |
Sentinel |
|
---|---|---|---|---|---|
Features |
|||||
Microsoft Defender ATP | |||||
Next Generation Anti-Virus | |||||
Endpoint Detection & Response Agent | |||||
Threat & Vulnerability Management | |||||
Web Content Filter | |||||
Patch Management | |||||
OS & 3rd Party Software Patching | |||||
Asset Inventory | |||||
Microsoft 365 ATP Plan 1 | |||||
Email Security Safe Links, Attachments | |||||
ATP for SharePoint, OneDrive & Teams | |||||
Anti-Phishing Policies | |||||
Stolen Credentials Detection | |||||
Microsoft 365 ATP Plan 2 | |||||
Threat Trackers | |||||
Advanced Threat Investigation | |||||
Incident Response Capabilities | |||||
User Reporting Capabilities | |||||
Attack Simulator Capabilities | |||||
Enterprise Mobility + Security E3 | |||||
Mobile Device Management | |||||
Microsoft Intune | |||||
MDM Conditional Access Integration | |||||
Disk Encryption | |||||
Conditional Access | |||||
Multi Factor Authentication | |||||
Advanced Threat Analytics | |||||
Behavioural Analysis | |||||
Enterprise Mobility + Security E5 | |||||
Risk based conditional Access | |||||
Privileged Identity Management (PIM) | |||||
Cloud App Security (CASB) | |||||
Azure Advanced Threat Protection | |||||
Malicious Insider Action Detection | |||||
Compromised Identity Protection | |||||
Lateral Movement Detection | |||||
SIEM | |||||
AI & Machine Learning | |||||
3rd Party SIEM Data Connectors | |||||
MDR SOC-as-a-Service |
|||||
Continuous (24x7x365) real-time alert monitoring by expert SOC analysts | |||||
Microsoft Security Experts & Threat Hunters | |||||
Full Incident validation eliminates false positives | |||||
Remote Incident Response assistance in the event of a confirmed breach | 3 |
3 |
5 |
Unlimited |
Unlimited |
Security Advisor |
|||||
Dedicated Security advisor as your team’s point-of-contact for technical and day-to-day service delivery | |||||
Reviews and answers questions about alerts/findings reports | |||||
Aids your team’s decision process when considering new security tools | |||||
Unlimited access to your advisor for guidance on programmatic security program improvements | |||||
Weekly Posture Review | |||||
Reporting & Assessments |
|||||
Findings Reports with tailored remediation guidance and recommendations | |||||
Annual Service Review and Recommendations | |||||
Monthly Threat Hunt Reports | |||||
Quarterly Review with Senior Security Advisors | |||||
State-of-your-Service summary reporting | |||||
Vulnerability Assessment Report |