- MODULESATTACK SURFACE MANAGEMENT (ASM)Digital FootprintDIGITAL RISK PROTECTION (DRP)Brand Reputation & ProtectionCYBER THREAT INTELLIGENCE (CTI)Threat Investigation
Protect Your Business with ECHO CTI
- Who We Are
- Plans
- Contact
- ACADEMY
Plans & Pricing
PICK THE PERFECT PLAN
ECHO Unified Treat Intelligence Platform
ECHO MANAGEMENT AND SUPPORT
ESSENTIAL | ADVANCED | EXCLUSIVE | |
---|---|---|---|
Platform Access | |||
Platform Access | 1 User | 5 Users | 15 Users |
Platform Support | |||
Platform Support | 9/6 via Platform, No SLA | 9/6 via Platform and E-mail | 7/24 via Platform, E-mail, and Online Meeting |
ECHO User Training (Onboarding Session) | |||
ECHO User Training (Onboarding Session) | Video Material | On-Demand via Online Meeting (4 Hours) | On-Demand via Online Meeting (6 Hours) |
Customer Success Support (Online Meeting On-demand) | |||
Customer Success Support (Online Meeting On-demand) | 1 Hour/Month | 1 Hour/2 Weeks | |
Integration | |||
Integration | Incident/Threat Feeds & IOCs Integration | Incident/Threat Feeds & IOCs Integration | |
2FA Login Support | |||
2FA Login Support | |||
On-time Email Alerting | |||
On-time Email Alerting | |||
Incident Playbook | |||
Incident Playbook | |||
Dedicated Analyst Support | |||
Dedicated Analyst Support |
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO EXTERNAL ATTACK SURFACE MANAGEMENT MODULE
ESSENTIAL | ADVANCED | EXCLUSIVE | |
---|---|---|---|
Digital Asset Discovery and Uptime Monitoring | |||
Digital Asset Discovery and Uptime Monitoring | Monthly | Weekly | Weekly |
Network Security Monitoring | |||
Network Security Monitoring | Critical Port Discovery | Critical Port Discovery | Critical Port Discovery + Active Port Scan |
Mail Server Security Check | |||
Mail Server Security Check | Once a quarter | Once a month | |
Website Security Check | |||
Website Security Check | Once a quarter | Once a month | |
Active Vulnerability Scan | |||
Active Vulnerability Scan | Once a month | Once a week | |
DNS Analyze | |||
DNS Analyze | |||
Network Vulnerability Intelligence | |||
Network Vulnerability Intelligence | |||
Service Detector | |||
Service Detector |
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO DIGITAL RISK PROTECTION MODULE
ESSENTIAL | ADVANCED | EXCLUSIVE | |
---|---|---|---|
PII Detection (Employee & Customer Credentials (username/password)) | |||
PII Detection (Employee & Customer Credentials (username/password)) | |||
Rogue and Impersonating Mobile Application Detection | |||
Rogue and Impersonating Mobile Application Detection | |||
Reputation Monitoring | |||
Reputation Monitoring | IP Reputation | IP, SMTP Server, and Domain Reputation | IP, SMTP Server, and Domain Reputation |
Social Media Monitoring | |||
Social Media Monitoring | Twitter Only (Up to 10 Keywords) | Twitter Only | Twitter Only |
Phishing Domain Detection & Tracking | |||
Phishing Domain Detection & Tracking | Domain Detection Only | Domain Detection & Tracking | Real-time Domain/Subdomain (Detection & Tracking) |
Impersonating Social Media Account Detection | |||
Impersonating Social Media Account Detection | Instagram/YouTube/Twitter | Instagram/YouTube/Twitter + Facebook, LinkedIn |
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO CYBER THREAT INTELLIGENCE MODULE
ESSENTIAL | ADVANCED | EXCLUSIVE | |
---|---|---|---|
Threat Investigation (Brand Search) | |||
Threat Investigation (Brand Search) | 100 queries/month (1200 queries in total) | 500 queries/month (6000 queries in total) | 1250 queries/month (15000 queries in total) |
Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.) | |||
Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.) | API | API | |
Indicator of Compromise Investigation | |||
Indicator of Compromise Investigation | |||
Historical Threat Intelligence Data | |||
Historical Threat Intelligence Data | |||
Git Tracker (Github Investigation) | |||
Git Tracker (Github Investigation) | |||
Vulnerability Tracking | |||
Vulnerability Tracking | |||
OSINT Investigation | |||
OSINT Investigation | |||
Cyber Security News | |||
Cyber Security News | |||
Darknet and Deepweb News | |||
Darknet and Deepweb News | |||
IOCs Portal/Threat Feeds Access | |||
IOCs Portal/Threat Feeds Access | |||
Cyber Threat Report Access | |||
Cyber Threat Report Access | |||
TTP/Threat Actor Monitoring and Reporting | |||
TTP/Threat Actor Monitoring and Reporting | |||
Area/Regional Intelligence | |||
Area/Regional Intelligence |
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.