Plans & Pricing

PICK THE PERFECT PLAN

ECHO Unified Treat Intelligence Platform

ECHO MANAGEMENT AND SUPPORT

ESSENTIAL ADVANCED EXCLUSIVE
Platform Access
Platform Access 1 User 5 Users 15 Users
Platform Support
Platform Support 9/6 via Platform, No SLA 9/6 via Platform and E-mail 7/24 via Platform, E-mail, and Online Meeting
ECHO User Training (Onboarding Session)
ECHO User Training (Onboarding Session) Video Material On-Demand via Online Meeting (4 Hours) On-Demand via Online Meeting (6 Hours)
Customer Success Support (Online Meeting On-demand)
Customer Success Support (Online Meeting On-demand) 1 Hour/Month 1 Hour/2 Weeks
Integration
Integration Incident/Threat Feeds & IOCs Integration Incident/Threat Feeds & IOCs Integration
2FA Login Support
2FA Login Support
On-time Email Alerting
On-time Email Alerting
Incident Playbook
Incident Playbook
Dedicated Analyst Support
Dedicated Analyst Support

*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.

ECHO EXTERNAL ATTACK SURFACE MANAGEMENT MODULE

ESSENTIAL ADVANCED EXCLUSIVE
Digital Asset Discovery and Uptime Monitoring
Digital Asset Discovery and Uptime Monitoring Monthly Weekly Weekly
Network Security Monitoring
Network Security Monitoring Critical Port Discovery Critical Port Discovery Critical Port Discovery + Active Port Scan
Mail Server Security Check
Mail Server Security Check Once a quarter Once a month
Website Security Check
Website Security Check Once a quarter Once a month
Active Vulnerability Scan
Active Vulnerability Scan Once a month Once a week
DNS Analyze
DNS Analyze
Network Vulnerability Intelligence
Network Vulnerability Intelligence
Service Detector
Service Detector

*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.

ECHO DIGITAL RISK PROTECTION MODULE

ESSENTIAL ADVANCED EXCLUSIVE
PII Detection (Employee & Customer Credentials (username/password))
PII Detection (Employee & Customer Credentials (username/password))
Rogue and Impersonating Mobile Application Detection
Rogue and Impersonating Mobile Application Detection
Reputation Monitoring
Reputation Monitoring IP Reputation IP, SMTP Server, and Domain Reputation IP, SMTP Server, and Domain Reputation
Social Media Monitoring
Social Media Monitoring Twitter Only (Up to 10 Keywords) Twitter Only Twitter Only
Phishing Domain Detection & Tracking
Phishing Domain Detection & Tracking Domain Detection Only Domain Detection & Tracking Real-time Domain/Subdomain (Detection & Tracking)
Impersonating Social Media Account Detection
Impersonating Social Media Account Detection Instagram/YouTube/Twitter Instagram/YouTube/Twitter + Facebook, LinkedIn

*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.

ECHO CYBER THREAT INTELLIGENCE MODULE

ESSENTIAL ADVANCED EXCLUSIVE
Threat Investigation (Brand Search)
Threat Investigation (Brand Search) 100 queries/month (1200 queries in total) 500 queries/month (6000 queries in total) 1250 queries/month (15000 queries in total)
Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.)
Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.) API API
Indicator of Compromise Investigation
Indicator of Compromise Investigation
Historical Threat Intelligence Data
Historical Threat Intelligence Data
Git Tracker (Github Investigation)
Git Tracker (Github Investigation)
Vulnerability Tracking
Vulnerability Tracking
OSINT Investigation
OSINT Investigation
Cyber Security News
Cyber Security News
Darknet and Deepweb News
Darknet and Deepweb News
IOCs Portal/Threat Feeds Access
IOCs Portal/Threat Feeds Access
Cyber Threat Report Access
Cyber Threat Report Access
TTP/Threat Actor Monitoring and Reporting
TTP/Threat Actor Monitoring and Reporting
Area/Regional Intelligence
Area/Regional Intelligence

*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.