FDR Total Security
The ideal approach for maximum protection against file-borne breaches and incidents is a comprehensive deployment - one that monitors all email, web connections, and network traffic for suspicious and malicious activity.
A summary recap of features and protections across the three domains is provided below.
Email:
-
Protection against:
- Account takeovers
- Business Email Compromise (BEC) scams
- Brand Impersonation
- VIP Impersonation
- Social Engineering
- Malware Lures
- Phishing Lures
- Ransomware
- Vulnerability Exploits
- Zero-Day Attacks
- N-Day Attacks
- Spam
-
Cutting edge, real-time email analysis
- Deep File Inspection (DFI)
- Dozens of Optical Character Recognition (OCR) / Computer Vision / Natural Language Processing (NLP) models automatically inspect all inbound/outbound email
- Complementary Integrations (MultiAV / Sandbox)
- more...
- Rich enforcement
- Outbound encryption support
- Seamless Integration
- End-user education via email decorations
- End-user feedback loop
- 360-degree visibility
- Invisible to outsiders / attackers
- RetroHunting
- Analytics dashboard
- Organization-wide deployment in less than an hour
Web:
-
Protection against:
- Zero-Day Attacks
- N-Day Attacks
- Command and Control (C2)
- Advanced Persistent Threats (APTs)
- Multiple Inspection Techniques
- Emerging Threat Detection
- Retrospective Malware Detection
- Data Loss Prevention
- Policy enforcement at scale
- IQScore
- Proactive Threat Intelligence
- SSL Fingerprinting
- Invisible to outsiders / attackers
- Deploys organization-wide in less than an hour
Network:
- Protection against:
- High Performance Network Inspection
- Turnkey physical and virtual appliance form factors
- Physical appliances with excellent data center economics
- Appliances collectively managed via single pane of glass
- Ingests data in-motion, data in-use, and data at-rest
- Complex threat hunting tasks are automated by leveraging intrusion analysis, intrusion detection, incident response, and event triage
- Alert on malicious network activities, investigate, and perform forensics analysis to determine root cause and then respond using event triage and mitigation
- Multiple Inspection Techniques
- Breach Detection and Containment
- Emerging Threat Detection
- Retrospective Malware Detection
- Data Loss Prevention
- IQScore
- Proactive Threat Intelligence
- RetroHunt Capability
- Invisible to outsiders / attackers
Pricing is based on:
Email capacity
- Number of inboxes protected (from 1 to 100,000)
- Subscription duration (one, two, or three years)
Web capacity
- Number of ICAP file scans per days (ranging from 2,000 to 100,000)
Network capacity
- Collector Appliance Throughout Rating (Gbps)
- Number of Collector Appliances
- Number of Manager Appliances
- Physical or Virtual Deployment