Pricing
DEFEND continuously monitors the data we receive from your IT for suspicious events.
These generate alerts which our SOC analysts will investigate and determine whether they are security incidents, potential vulnerabilities, or a false positive.
FEATURES LIST
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Security Operations Centre | |||
Integrated Security Operations | ✔ | ✔ | We integrate with your other Security tools and products,
monitor them and use them to take defensive actions. |
Access to UK Cybersecurity Experts | ✔ | ✔ | UK experts available by phone, email, and instant messaging. |
True CyberSecurity
Partnership | ✔ | ✔ | FoxTech is dedicated to understanding your unique security
needs offering customised strategies and robust support. |
Pro-active advice | ✔ | ✔ | We’re here to help make sure you’re doing the right things.
Not just generating alerts for you. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Security Operations Centre | |||
Integrated Security Operations | ✔ | ✔ | We integrate with your other Security tools and products,
monitor them and use them to take defensive actions. |
Access to UK Cybersecurity Experts | ✔ | ✔ | UK experts available by phone, email, and instant messaging. |
True CyberSecurity
Partnership | ✔ | ✔ | FoxTech is dedicated to understanding your unique security
needs offering customised strategies and robust support. |
Pro-active advice | ✔ | ✔ | We’re here to help make sure you’re doing the right things.
Not just generating alerts for you. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Cloud Monitoring | |||
O365/Google
Workplace | ✔ | ✔ | Continuous cloud monitoring across AWS/Azure,
providing real-time threat detection and response |
IaaS Montioring:
Azure, AWS, GCP | ✔ | ✔ | Real-time O365/Google Workplace monitoring
immediate threat identification and remediation |
SaaS Apps | ✔ | Proactive threat detection, analysis, and swift response
across SaaS applications. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Cloud Monitoring | |||
O365/Google
Workplace | ✔ | ✔ | Continuous cloud monitoring across AWS/Azure,
providing real-time threat detection and response |
IaaS Montioring:
Azure, AWS, GCP | ✔ | ✔ | Real-time O365/Google Workplace monitoring
immediate threat identification and remediation |
SaaS Apps | ✔ | Proactive threat detection, analysis, and swift response
across SaaS applications. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Host Intrusion Detection | |||
File Integrity Monitoring | ✔ | ✔ | Monitors changes to critical system files and configurations,
alerting to unauthorised changes. Crucial in detecting
potential breaches. |
Server Monitoring | ✔ | ✔ | In-depth analysis of server activities and application
behavior to identify threats. |
Workstation Monitoring | ✔ | XDR (Extended Detection and Response) agent on
workstations for real-time threat detection through log
analysis. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Host Intrusion Detection | |||
File Integrity Monitoring | ✔ | ✔ | Monitors changes to critical system files and configurations,
alerting to unauthorised changes. Crucial in detecting
potential breaches. |
Server Monitoring | ✔ | ✔ | In-depth analysis of server activities and application
behavior to identify threats. |
Workstation Monitoring | ✔ | XDR (Extended Detection and Response) agent on
workstations for real-time threat detection through log
analysis. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Netflow Monitoring | |||
Network Flow Monitoring | ✔ | Leveraging flow data from your network devices enables
early detection and alerts on malware Command &
Control connections. | |
Protective DNS | ✔ | Anycast DNS service blocks malicious domains in real time,
with FoxTech Defend monitoring. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Netflow Monitoring | |||
Network Flow Monitoring | ✔ | Leveraging flow data from your network devices enables
early detection and alerts on malware Command &
Control connections. | |
Protective DNS | ✔ | Anycast DNS service blocks malicious domains in real time,
with FoxTech Defend monitoring. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Threat Intelligence | |||
Threat Intelligence Feeds | ✔ | ✔ | Advanced threat detection and response using current
intelligence on adversary tactics and Indications of
Compromise (IoCs) |
Dark Web Monitoring | ✔ | Ongoing dark web surveillance to detect company information
leaks, mitigating risks before they impact your business. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Threat Intelligence | |||
Threat Intelligence Feeds | ✔ | ✔ | Advanced threat detection and response using current
intelligence on adversary tactics and Indications of
Compromise (IoCs) |
Dark Web Monitoring | ✔ | Ongoing dark web surveillance to detect company information
leaks, mitigating risks before they impact your business. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Rapid Incident Response | |||
Instant Response | ✔ | Pre-defined automated responses to immediately
defend against attacks. | |
Extended Detection and
Response (XDR) | ✔ | ✔ | Pre-defined response actions such as: Block IP at firewall;
Isolate Device; Remove e-mail from mailbox |
Day 1 Incident Response
Manager | ✔ | We will provide an incident response manager for the first day
to coordinate actions after a major incident. | |
Week 1 Incident
Response Manager | ✔ | We will provide an incident response manager coordinates
first-week actions post major incidents. | |
Bespoke Incident
Response Plan | ✔ | We will work with you to create a bespoke, and workable,
incident response plan |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Rapid Incident Response | |||
Instant Response | ✔ | Pre-defined automated responses to immediately
defend against attacks. | |
Extended Detection and
Response (XDR) | ✔ | ✔ | Pre-defined response actions such as: Block IP at firewall;
Isolate Device; Remove e-mail from mailbox |
Day 1 Incident Response
Manager | ✔ | We will provide an incident response manager for the first day
to coordinate actions after a major incident. | |
Week 1 Incident
Response Manager | ✔ | We will provide an incident response manager coordinates
first-week actions post major incidents. | |
Bespoke Incident
Response Plan | ✔ | We will work with you to create a bespoke, and workable,
incident response plan |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Forensic Log Storage | |||
6 months log retention | ✔ | We will keep logs for 6 months to allow for the
investigation of historic events | |
12 months log retention | ✔ | We will keep logs for 12 months to allow for the
investigation of historic events | |
Tamperproof, offsite
log storage | ✔ | ✔ | Logs stored offsite, with chain of signatures to
protect from tampering |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Forensic Log Storage | |||
6 months log retention | ✔ | We will keep logs for 6 months to allow for the
investigation of historic events | |
12 months log retention | ✔ | We will keep logs for 12 months to allow for the
investigation of historic events | |
Tamperproof, offsite
log storage | ✔ | ✔ | Logs stored offsite, with chain of signatures to
protect from tampering |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Compliance Reporting | |||
Unified security dashboard | ✔ | ✔ | All security events aggregated in FoxTech DEFEND dashboard. |
Weekly Summary Report | ✔ | ✔ | Weekly security summary reports, sent via email. |
Quarterly In-Depth Report | ✔ | ✔ | In-depth written report created by our analysts once
per quarter. |
Monthly security review | ✔ | Monthly meeting to review any key activities and
recommendations |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Compliance Reporting | |||
Unified security dashboard | ✔ | ✔ | All security events aggregated in FoxTech DEFEND dashboard. |
Weekly Summary Report | ✔ | ✔ | Weekly security summary reports, sent via email. |
Quarterly In-Depth Report | ✔ | ✔ | In-depth written report created by our analysts once
per quarter. |
Monthly security review | ✔ | Monthly meeting to review any key activities and
recommendations |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Expert Analysis | |||
Full triage and analysis
of alerts | ✔ | ✔ | Our Security Experts will comprehensively examine alerts for
nature, impact, and accuracy. |
MITRE ATT&CK Model
mapping | ✔ | ✔ | Threats mapped to MITRE ATT&CK for structured
defense strategies. |
Dedicated UK Analysts | ✔ | ✔ | Staffed by experienced cybersecurity professionals based in the
UK, providing expert analysis and support. |
Proactive Threat Hunting | ✔ | Proactive threat hunting involves in-depth analysis and
investigation to uncover and neutralize previously
unidentified threats. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Expert Analysis | |||
Full triage and analysis
of alerts | ✔ | ✔ | Our Security Experts will comprehensively examine alerts for
nature, impact, and accuracy. |
MITRE ATT&CK Model
mapping | ✔ | ✔ | Threats mapped to MITRE ATT&CK for structured
defense strategies. |
Dedicated UK Analysts | ✔ | ✔ | Staffed by experienced cybersecurity professionals based in the
UK, providing expert analysis and support. |
Proactive Threat Hunting | ✔ | Proactive threat hunting involves in-depth analysis and
investigation to uncover and neutralize previously
unidentified threats. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Human Security | |||
Policy Management | ✔ | The platform promotes compliance and security awareness
through policy management. | |
Security Awareness Training | ✔ | Comprehensive, bite-sized cybersecurity training to bolster
employee skills in recognising and defending against cyber
threats. | |
Policy portal for auditers | ✔ | A secure portal for auditors to access company policies,
enhancing transparency and efficiency in compliance reviews. | |
Phishing simulations | ✔ | Phishing simulations test and enhance employee
threat awareness |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Human Security | |||
Policy Management | ✔ | The platform promotes compliance and security awareness
through policy management. | |
Security Awareness Training | ✔ | Comprehensive, bite-sized cybersecurity training to bolster
employee skills in recognising and defending against cyber
threats. | |
Policy portal for auditers | ✔ | A secure portal for auditors to access company policies,
enhancing transparency and efficiency in compliance reviews. | |
Phishing simulations | ✔ | Phishing simulations test and enhance employee
threat awareness |