Managed XDR

Managed XDR

Detect and Disrupt Cyberthreats with unprecedented speed and accuracy to reduce your cyber risk

Extended
Detection and Response
Managed Extended
Detection and Response
Endpoint
Detection and Response

Extended Detection and Response enables you to detect, hunt and respond to threats faster and more efficiently with Endpoint Detection & Response, Network Traffic Analysis, Malware Detonation and Email Protection powered by Group-IB

Feature Matrix

Features
Standard
Pro
Enterprise
XDR - Extended Detection and Response

XDR Correlation

Consolidated Data lake across Telemetry

Incident management

Integrated Threat Intelligence

Single Incident Response Console

TI Graph View

Upload Suspicious file for Detonation

Interactive Sandbox Environment

Support

8x5
Messaging & email
24x7
Phone & Chat & email
24x7
Phone & Chat & email

API

EDR - Endpoint Protect and Response

Endpoint Forensics Data Retention for Threat Hunting

7 Days
14 Days
30 Days

Forensics Evidence Collection

Streamlined response

Indicators of Compromise Collection

Asset Inventory

Application Allow and Deny list

Suspicious File Detonation

BIOS / UEFI Firmware Threat Protection

Coming
BEP - Business Email Protection

Antivirus protection (Cloud Only)

Spam filtering (Cloud Only)

Policy-based content filtering (Cloud Only)

Email history and logs

14 Days
30 Days
60 Days

Malicious email blocking

Malware & Links Detonation (sandbox)

Full Malware Detonation reports with deep IOCs and analytical evidence

Threat attribution

Group-IB Cloud-to-Ground Tunneling Technology to improve detonation

Group-IB VM Morphing Technology

Flexible Automated Environment Adaptation

On-prem availability

NTA - Network Traffic Analysis

Network Traffic history and logs

14 Days
30 Days
60 Days

NTA Virtual Appliances

1
10
30

Full NTA Functionality

Network File Intercept and Detonation

Malware Detonation Platform (Sandbox)

Threat attribution powered by Group-IB Threat Intelligence

Group-IB Cloud-to-Ground Tunneling Technology to improve detonation

Flexible Automated Environment Adaptation

Attack Surface Management

Attack Surface Management

Option
Included

Subscription Plans

Standard

Replace your AV solution with superior threat detection

Talk to sales
Pro

Hunt for threats and remove risk with granular controls

Talk to sales
Enterprise

Complete visibility of threats and comprehensive response tools

Talk to sales

Managed Extended Detection and Response offers fully managed threat detection, hunting and response powered by Group-IB's Endpoint Detection & Response, Network Traffic Analysis, Malware Detonation and Email Protection

Feature Matrix

Features
Standard
Pro
Enterprise

24/7 Managed Detection

DFIR Priority Access

Managed Response

Managed Threat Hunting

Generic MTH Status Reports

Named Threat Hunter

Customer-specific Threat Landscape

Tailored MTH Status Reports

Monthly MTH Status Meetings

Subscription Plans

Standard

Around-the-clock monitoring and analysis of suspicious events

Talk to sales
Pro

Complete coverage of security incidents operations with managed detection, threat hunting and response

Talk to sales
Enterprise

Leverage advanced threat hunting capabilities and dedicated team

Talk to sales

Endpoint Detection & Response enables you to quickly and efficiently detect, hunt and respond to threats on your endpoints

Feature Matrix

Features
Standard
Pro
Enterprise

Endpoint Forensics Data Retention for Threat Hunting

7 Days
14 Days
30 Days

Forensic Data Collection from Endpoints

Threat Intelligence Feed

Asset Inventory

Application Allow and Deny list

Suspicious File Detonation

Bios Setup/ UEFI Firmware Threat Protection

Threat Hunting Console

Full Malware Detonation Reports with Deep IOCs and Analytical Evidence

Threat attribution

Group-IB Cloud-to-Ground Tunneling ® Technology to improve detonation

Group-IB VM Morphing ® Technology

Flexible Automated Environment Adaptation

Subscription Plans

Standard

Endpoint solution basics and threat hunting console

Talk to sales
Pro

Benefit from malware detonation and threat attribution

Talk to sales
Enterprise

Unlimited capabilities for threat hunting and access to advanced technologies

Talk to sales

Courses

Develop your inhouse cybersecurity competencies to operate effectively and protect your company from cyber threats

Blue Team Analyst
Blue Team Analyst
Learn how to monitor for IS incidents, detect threats, eliminate false positives, and perform initial incident response.
On-Prem workshop
Duration - 3 days
Online workshop
Up to 12 person
Learn more
Incident Responder
Incident Responder
Learn how to stop cyberattacks, prioritize incidents, and mitigate the damage.
On-Prem workshop
Duration - 3 days
Online workshop
Up to 12 person
Learn more
Threat Hunter
Threat Hunter
Learn how to proactively hunt for hidden, undetectable threats within the network.
On-Prem workshop
Duration - 3 days
Online workshop
Up to 12 person
Learn more