
Our Pricing
Enterprise-grade protection tailored to your organization's scale, delivering comprehensive security without complexity.
Our model is simple, complete the form below to get your quote
Explore Our Tiers
Comprehensive Protection, Simplified.
CloudJacket Platform
Advanced AI-driven security monitoring and response.
Client-Accessible Web Portal
Real-time visibility into security events and alerts.
Technical Support
Includes configuration support, troubleshooting of issues encountered, user account management, and retained data retrieval for the CloudJacket Platform.
90-Day Data Index
Readily available security data index available on customer facing dashboard.
365-Day Data Retention
Forensic data securely archived for compliance and investigations.
+
+
Compliance Reporting
Associates security data with various defined regulatory compliance regimes.
+
System File Integrity Monitoring
Detects and records changes to critical system files.
Endpoint Inventory
Collects and displays security and regulatory compliance data for individual endpoints.
Endpoint Agent Provisioning
Deployment of endpoint security agents.
Vulnerability Management
Identifies known vulnerabilities in software on endpoint agents and tracks remediation status.
+
Malware Detection
Scans filesystem and registry for malware, detecting rootkits via processes, ports, files, permissions, and network interfaces.
Antivirus Monitoring
Monitors specific antivirus software (Windows Defender, ClamAV) for important events.
Active Response
Rapid response actions to isolate or disrupt communications on endpoints with suspected critical indications of compromise.
Cloud Platform Monitoring
Retrieves, stores, and analyzes cloud infrastructure data
+
+
Security Information Event Management (SIEM)
Centralized security data aggregation and analysis.
24/7 SOC-Managed Security
Expert-driven threat monitoring, alert review, proactive threat hunting, and incident response.
24/7 Professional Support
Dedicated Security Operations Specialist (SOS) provides expert knowledge, rapid incident response, real-time threat mitigation, and expert-driven threat hunting.
Network Detection and Response
An Intrusion Prevention System (IPS) typically deployed in-line between a gateway and core switch.
+
+
Lateral Threat Detection
Inspects east-west traffic within a network to identify anomalous activity which would not cross the IPS sensor.
+
+
Internal Threat Detection
Utilizes deceptive security to identify threats originating from the internal network.