Pricing
DEFEND continuously monitors the data we receive from your IT for suspicious events.
These generate alerts which our SOC analysts will investigate and determine whether they are security incidents, potential vulnerabilities, or a false positive.
FEATURES LIST
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Security Operations Centre | |||
Integrated Security Operations | ✔ | ✔ | We integrate with your other Security tools and products, monitor them and use them to take defensive actions. |
Access to UK Cybersecurity Experts | ✔ | ✔ | UK experts available by phone, email, and instant messaging. |
True CyberSecurity Partnership | ✔ | ✔ | FoxTech is dedicated to understanding your unique security needs offering customised strategies and robust support. |
Pro-active advice | ✔ | ✔ | We’re here to help make sure you’re doing the right things. Not just generating alerts for you. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Security Operations Centre | |||
Integrated Security Operations | ✔ | ✔ | We integrate with your other Security tools and products, monitor them and use them to take defensive actions. |
Access to UK Cybersecurity Experts | ✔ | ✔ | UK experts available by phone, email, and instant messaging. |
True CyberSecurity Partnership | ✔ | ✔ | FoxTech is dedicated to understanding your unique security needs offering customised strategies and robust support. |
Pro-active advice | ✔ | ✔ | We’re here to help make sure you’re doing the right things. Not just generating alerts for you. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Cloud Monitoring | |||
O365/Google Workplace | ✔ | ✔ | Continuous cloud monitoring across AWS/Azure, providing real-time threat detection and response |
IaaS Montioring: Azure, AWS, GCP | ✔ | ✔ | Real-time O365/Google Workplace monitoring immediate threat identification and remediation |
SaaS Apps | ✔ | Proactive threat detection, analysis, and swift response across SaaS applications. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Cloud Monitoring | |||
O365/Google Workplace | ✔ | ✔ | Continuous cloud monitoring across AWS/Azure, providing real-time threat detection and response |
IaaS Montioring: Azure, AWS, GCP | ✔ | ✔ | Real-time O365/Google Workplace monitoring immediate threat identification and remediation |
SaaS Apps | ✔ | Proactive threat detection, analysis, and swift response across SaaS applications. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Host Intrusion Detection | |||
File Integrity Monitoring | ✔ | ✔ | Monitors changes to critical system files and configurations, alerting to unauthorised changes. Crucial in detecting potential breaches. |
Server Monitoring | ✔ | ✔ | In-depth analysis of server activities and application behavior to identify threats. |
Workstation Monitoring | ✔ | XDR (Extended Detection and Response) agent on workstations for real-time threat detection through log analysis. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Host Intrusion Detection | |||
File Integrity Monitoring | ✔ | ✔ | Monitors changes to critical system files and configurations, alerting to unauthorised changes. Crucial in detecting potential breaches. |
Server Monitoring | ✔ | ✔ | In-depth analysis of server activities and application behavior to identify threats. |
Workstation Monitoring | ✔ | XDR (Extended Detection and Response) agent on workstations for real-time threat detection through log analysis. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Netflow Monitoring | |||
Network Flow Monitoring | ✔ | Leveraging flow data from your network devices enables early detection and alerts on malware Command & Control connections. | |
Protective DNS | ✔ | Anycast DNS service blocks malicious domains in real time, with FoxTech Defend monitoring. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Netflow Monitoring | |||
Network Flow Monitoring | ✔ | Leveraging flow data from your network devices enables early detection and alerts on malware Command & Control connections. | |
Protective DNS | ✔ | Anycast DNS service blocks malicious domains in real time, with FoxTech Defend monitoring. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Threat Intelligence | |||
Threat Intelligence Feeds | ✔ | ✔ | Advanced threat detection and response using current intelligence on adversary tactics and Indications of Compromise (IoCs) |
Dark Web Monitoring | ✔ | Ongoing dark web surveillance to detect company information leaks, mitigating risks before they impact your business. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Threat Intelligence | |||
Threat Intelligence Feeds | ✔ | ✔ | Advanced threat detection and response using current intelligence on adversary tactics and Indications of Compromise (IoCs) |
Dark Web Monitoring | ✔ | Ongoing dark web surveillance to detect company information leaks, mitigating risks before they impact your business. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Rapid Incident Response | |||
Instant Response | ✔ | Pre-defined automated responses to immediately defend against attacks. | |
Extended Detection and Response (XDR) | ✔ | ✔ | Pre-defined response actions such as: Block IP at firewall; Isolate Device; Remove e-mail from mailbox |
Day 1 Incident Response Manager | ✔ | We will provide an incident response manager for the first day to coordinate actions after a major incident. | |
Week 1 Incident Response Manager | ✔ | We will provide an incident response manager coordinates first-week actions post major incidents. | |
Bespoke Incident Response Plan | ✔ | We will work with you to create a bespoke, and workable, incident response plan |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Rapid Incident Response | |||
Instant Response | ✔ | Pre-defined automated responses to immediately defend against attacks. | |
Extended Detection and Response (XDR) | ✔ | ✔ | Pre-defined response actions such as: Block IP at firewall; Isolate Device; Remove e-mail from mailbox |
Day 1 Incident Response Manager | ✔ | We will provide an incident response manager for the first day to coordinate actions after a major incident. | |
Week 1 Incident Response Manager | ✔ | We will provide an incident response manager coordinates first-week actions post major incidents. | |
Bespoke Incident Response Plan | ✔ | We will work with you to create a bespoke, and workable, incident response plan |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Forensic Log Storage | |||
6 months log retention | ✔ | We will keep logs for 6 months to allow for the investigation of historic events | |
12 months log retention | ✔ | We will keep logs for 12 months to allow for the investigation of historic events | |
Tamperproof, offsite log storage | ✔ | ✔ | Logs stored offsite, with chain of signatures to protect from tampering |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Forensic Log Storage | |||
6 months log retention | ✔ | We will keep logs for 6 months to allow for the investigation of historic events | |
12 months log retention | ✔ | We will keep logs for 12 months to allow for the investigation of historic events | |
Tamperproof, offsite log storage | ✔ | ✔ | Logs stored offsite, with chain of signatures to protect from tampering |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Compliance Reporting | |||
Unified security dashboard | ✔ | ✔ | All security events aggregated in FoxTech DEFEND dashboard. |
Weekly Summary Report | ✔ | ✔ | Weekly security summary reports, sent via email. |
Quarterly In-Depth Report | ✔ | ✔ | In-depth written report created by our analysts once per quarter. |
Monthly security review | ✔ | Monthly meeting to review any key activities and recommendations |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Compliance Reporting | |||
Unified security dashboard | ✔ | ✔ | All security events aggregated in FoxTech DEFEND dashboard. |
Weekly Summary Report | ✔ | ✔ | Weekly security summary reports, sent via email. |
Quarterly In-Depth Report | ✔ | ✔ | In-depth written report created by our analysts once per quarter. |
Monthly security review | ✔ | Monthly meeting to review any key activities and recommendations |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Expert Analysis | |||
Full triage and analysis of alerts | ✔ | ✔ | Our Security Experts will comprehensively examine alerts for nature, impact, and accuracy. |
MITRE ATT&CK Model mapping | ✔ | ✔ | Threats mapped to MITRE ATT&CK for structured defense strategies. |
Dedicated UK Analysts | ✔ | ✔ | Staffed by experienced cybersecurity professionals based in the UK, providing expert analysis and support. |
Proactive Threat Hunting | ✔ | Proactive threat hunting involves in-depth analysis and investigation to uncover and neutralize previously unidentified threats. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Expert Analysis | |||
Full triage and analysis of alerts | ✔ | ✔ | Our Security Experts will comprehensively examine alerts for nature, impact, and accuracy. |
MITRE ATT&CK Model mapping | ✔ | ✔ | Threats mapped to MITRE ATT&CK for structured defense strategies. |
Dedicated UK Analysts | ✔ | ✔ | Staffed by experienced cybersecurity professionals based in the UK, providing expert analysis and support. |
Proactive Threat Hunting | ✔ | Proactive threat hunting involves in-depth analysis and investigation to uncover and neutralize previously unidentified threats. |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Human Security | |||
Policy Management | ✔ | The platform promotes compliance and security awareness through policy management. | |
Security Awareness Training | ✔ | Comprehensive, bite-sized cybersecurity training to bolster employee skills in recognising and defending against cyber threats. | |
Policy portal for auditers | ✔ | A secure portal for auditors to access company policies, enhancing transparency and efficiency in compliance reviews. | |
Phishing simulations | ✔ | Phishing simulations test and enhance employee threat awareness |
DEFEND Essentials | DEFEND | Notes/Description | |
---|---|---|---|
Human Security | |||
Policy Management | ✔ | The platform promotes compliance and security awareness through policy management. | |
Security Awareness Training | ✔ | Comprehensive, bite-sized cybersecurity training to bolster employee skills in recognising and defending against cyber threats. | |
Policy portal for auditers | ✔ | A secure portal for auditors to access company policies, enhancing transparency and efficiency in compliance reviews. | |
Phishing simulations | ✔ | Phishing simulations test and enhance employee threat awareness |