True MDR Pricing
MDR
€
£
₽
₹
$22.99/month
- SOC 2 Type 2 Certified
- Optional AWS hosting in
GovCloud - 365 days of storage
retention 100%
MDR + EDR
€
£
₽
₹
$27.99/month
- AI Driven Threat Detection
- Offline Protections
- Behavioral Analysis
MDR + EDR + VULN
€
£
₽
₹
$35.99/month
- Custom classifiers for
sensitive data types - Implement privileged
access management - Vulnerability scanning for
Mac, Windows, and Linux
MDR
€
£
₽
₹
$33.99/Yearly
- SOC 2 Type 2 Certified
- Optional AWS hosting in
GovCloud - 365 days of storage
retention 100%
MDR + EDR
€
£
₽
₹
$127.99/Yearly
- AI Driven Threat Detection
- Offline Protections
- Behavioral Analysis
MDR + EDR + VULN
€
£
₽
₹
$75.99/Yearly
- Custom classifiers for
sensitive data types - Implement privileged
access management - Vulnerability scanning for
Mac, Windows, and Linux
MDR
Key Features in MDR include:
BitLyft Managed Security Services
- Fully Managed Offering
- SOC 2 Type 2 Certified
- Security Operations Center
24/7/365 monitoring, management of the SIEM Platform, and mitigation of emerging threats - Components, including alarm tuning and any needed custom parser creation
- Central Threat Intelligence data feed
- Reporting and dashboards
- Unified Logging from every source
- Threat Hunting
- Incident Response
- Network Detection + Response
- M365 Detection + Response
- Microsoft Azure Detection + Response
- AWS Detection + Response
- Endpoint Detection + Response
- Firewall Detection + Response
BitLyft Air® and SIEM Management
- Optional AWS hosting in GovCloud (CMMC Requirements Met)
- 365 days of storage retention 100%
- USA-based citizens as employees
- Licensing based on Gb/day
- Anomaly Detections (AI/ML)
- Collector Management
- Compliance + Reporting
- Correlation Engine
- Data Enrichment Engine
- Data Visualization Engine
- Security Incident Alerts /Triggers
- Integrated Threat Intelligence, GEO IP Feeds, Lookups
- Log Archival and Restoration
- REST API’s
- Role-based Access Control
- Malicious Script Trigger Notifications
- Defined Search and Dashboard Parameters
- Security Analytics
- SOAR Integration
- Technical Support
MDR + EDR
Key Features in MDR + EDR include:
Cylance
- Fully Managed Offering
- AI Driven Threat Detection: Uses artificial intelligence to predict and prevent threats
- Offline Protections: Provides protection even when the endpoint is offline, unlike traditional signature-based solutions
- Behavioral Analysis: Detects threats based on behavioral patterns rather then relying solely on known signatures
- Suitable for devices with high-performance needs
- Prevents reinfection during the recovery process from backups
- Optics deep visibility into endpoint activities
- Analysis of files an processes
- Aggregates data from all endpoints and can send information to a Security and Event Management (SIEM) tool
MDR + EDR + VULN
Key Features in MDR + EDR + VULN include:
Data Discovery
- Fully Managed Offering
- Custom classifiers to classify your private sensitive data by type
- High capabilities in image recognition Low volume of false positives with ongoing support for continual fine tuning
- Visibility in hybrid environments with remote users and cloud applications
- Executive reporting and easy-to-use query selection for detailed operational reporting
Identity Access Management
- Implement privileged access management solutions
- Low volume of false positives with ongoing support for continual fine tuning
- Cloud access audit capability through Microsoft 365 and Google Workspace
- Permissions scanning across hybrid environments
- Simple to understand who can access and who has accessed sensitive data
Risk-Based Vulnerability Management
- Vulnerability scanning for Mac, Windows, and Linux endpoints
- Endpoint, internal network, and external vulnerability scanning
- Industry-leading vulnerability feeds with regular updates from a top-tier provider
- Vulnerability scanning support across 9,700+ different vulnerable products
- CIS benchmark scanning for configuration recommendations
- Historical tracking to demonstrate the effect of your vulnerable products
- CIS benchmark scanning for configuration recommendations
- Historical tracking to demonstrate the effect of your vulnerability management activities
Frequently Asked Question
- Do you offer vulnerability scanning?
-
Yes, we can include vulnerability scanning a'la cart. Pricing is based on the number of devices and frequency.
- Are there any professional service onboarding fees?
-
Our professional service onboarding fees are competitive with the industry. In order to give an accurate setup fee, we will need to do a scoping call to understand the scale and complexity of your environment.
- Is there an annual contract?
-
Our service is typically based on annual contracts paid monthly. Contact us for further pricing discounts for longer-term contracts.
- Is there really unlimited automation?
-
Yes. We are interested in keeping mean time to detection (MTTD) and mean time to remediation (MTTR) as quick as possible through automation. We'll set up automations that make the most sense for your unique environment.
- What is the threat feed sync?
-
We utilize our Central Threat Intelligence (CTI) to curate a contextualized and validated threat feed. This is sourced from users on our platform, as well as OSINT and other validated threat sources to provide proactive protection.
- Does BitLyft offer a Partnership Program?
-
Yes, BitLyft proudly offers a comprehensive partnership program. We collaborate with businesses to deliver top-tier cybersecurity solutions and foster mutual growth. Explore partnership opportunities here.