Licensing

XDRAIV Comply

  • Log Data Collection and Analysis
  • File Integrity Monitoring (FIM)
  • Container Security Monitoring
  • Security Configuration Assessment
  • Security Information and Event Management (SIEM)
  • Regulatory Compliance Dashboards
  • Interactive Reporting
  • Agent-based and Agentless Monitoring
  • Active Response
  • Cloud Security Monitoring
  • Predefined Rules
  • Custom Rules
  • Custom Dashboards
  • Anomaly Detection
  • Custom Data Connectors
  • Advanced Data Visualization
  • User Behavior Analysis
  • Threat Intelligence

XDRAIV Secure

  • Log Data Collection and Analysis
  • File Integrity Monitoring (FIM)
  • Container Security Monitoring
  • Security Configuration Assessment
  • Security Information and Event Management (SIEM)
  • Regulatory Compliance Dashboards
  • Interactive Reporting
  • Agent-based and Agentless Monitoring
  • Active Response
  • Cloud Security Monitoring
  • Predefined Rules
  • Custom Rules
  • Custom Dashboards
  • Anomaly Detection
  • Custom Data Connectors
  • Advanced Data Visualization
  • User Behavior Analysis
  • Threat Intelligence
  • Custom Workflows
  • Automated Workflows
  • Incident Management
  • Forensic Investigation
  • Endpoint Detection and Response (EDR)

XDRAIV Enterprise

  • Log Data Collection and Analysis
  • File Integrity Monitoring (FIM)
  • Container Security Monitoring
  • Security Configuration Assessment
  • Security Information and Event Management (SIEM)
  • Regulatory Compliance Dashboards
  • Interactive Reporting
  • Agent-based and Agentless Monitoring
  • Active Response
  • Cloud Security Monitoring
  • Predefined Rules
  • Custom Rules
  • Custom Dashboards
  • Anomaly Detection
  • Custom Data Connectors
  • Advanced Data Visualization
  • User Behavior Analysis
  • Threat Intelligence
  • Custom Workflows
  • Automated Workflows
  • Incident Management
  • Forensic Investigation
  • Endpoint Detection and Response (EDR)
  • Security Awareness Testing (Phishing)
  • Malicious Behaviour Monitoring (Honeypot)
  • Network Vulnerability Scanning
  • Private Blockchain Network
  • Automated Malware Analysis
  • Intrusion Prevention System (IPS)
  • Web Application Vulnerability Scanning