Which plan suits your business needs?

Standard

$ 99
99
Monthly/Host
  • Active Defence
  • 24/7 Event Log Monitoring
  • Compliance Logging & Monitoring
  • Security Dashboard
  • Security & Operations Alerts
  • Status Reports

All-in-One

$ 149
99
Monthly/Host
  • Active Defence
  • 24/7 Event Log Monitoring
  • Compliance Logging & Monitoring
  • Security Dashboard
  • Security & Operations Alerts
  • Status Reports
Popular

No lock-in contracts

On-prem or in any cloud

Live chat and call support

Multi-platforms

On-demand or automatic blocking of persistent brute force attacks, bad bots, vulnerability exploits or low reputation IP coming into contact with customers’ IT systems. 

Detexian detects indicators of attack (e.g. brute force, SQL injections, vulnerability exploits), indicators of compromise (e.g. unusual outbound communications, authentication anomalies, file share access anomalies, unusual data exfiltration) and indicators of system failure (e.g. disk filling up, out of memory, buggy software). 

Alerts by email, phone or communications apps such as WhatsApp or Slack, containing information about what triggered the alert, the resources targeted, the source of the attack and any contextual information that may be helpful when investigating a threat.

Coming with each security alert is a remediation proposal to assist with eradicating the cause of the threat or containing the damage of the incident.

Log monitoring is one of the most effective ways to inspect your IT systems for security and operational issues. It reveals what happened before, during and after a security incident or system failure to help you tackle the root cause of the issue. 

Single pane of glass providing “at a glance” security -related information. It also provides a security score and configuration rating, so customers where they are ranked amongst peers.

Log monitoring is an integral part of meeting compliance standards such as PCI DSS, HIPPA, SOX, SOC, GLBA.

Periodic summaries of activities and issues reported in a friendly business format shareable with IT and non-IT stakeholders. 

Close Menu