- MODULES
ATTACK SURFACE MANAGEMENT (ASM)
Digital FootprintDIGITAL RISK PROTECTION (DRP)
Brand Reputation & ProtectionCYBER THREAT INTELLIGENCE (CTI)
Threat InvestigationProtect Your Business with ECHO CTI
- Who We Are
- Plans
- Contact
- ACADEMY
Plans & Pricing
PICK THE PERFECT PLAN
ECHO Unified Treat Intelligence Platform
ECHO MANAGEMENT AND SUPPORT
| ESSENTIAL | ADVANCED | EXCLUSIVE | |
|---|---|---|---|
| Platform Access | |||
| Platform Access | 1 User | 5 Users | 15 Users |
| Platform Support | |||
| Platform Support | 9/6 via Platform, No SLA | 9/6 via Platform and E-mail | 7/24 via Platform, E-mail, and Online Meeting |
| ECHO User Training (Onboarding Session) | |||
| ECHO User Training (Onboarding Session) | Video Material | On-Demand via Online Meeting (4 Hours) | On-Demand via Online Meeting (6 Hours) |
| Customer Success Support (Online Meeting On-demand) | |||
| Customer Success Support (Online Meeting On-demand) | 1 Hour/Month | 1 Hour/2 Weeks | |
| Integration | |||
| Integration | Incident/Threat Feeds & IOCs Integration | Incident/Threat Feeds & IOCs Integration | |
| 2FA Login Support | |||
| 2FA Login Support | |||
| On-time Email Alerting | |||
| On-time Email Alerting | |||
| Incident Playbook | |||
| Incident Playbook | |||
| Dedicated Analyst Support | |||
| Dedicated Analyst Support | |||
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO EXTERNAL ATTACK SURFACE MANAGEMENT MODULE
| ESSENTIAL | ADVANCED | EXCLUSIVE | |
|---|---|---|---|
| Digital Asset Discovery and Uptime Monitoring | |||
| Digital Asset Discovery and Uptime Monitoring | Monthly | Weekly | Weekly |
| Network Security Monitoring | |||
| Network Security Monitoring | Critical Port Discovery | Critical Port Discovery | Critical Port Discovery + Active Port Scan |
| Mail Server Security Check | |||
| Mail Server Security Check | Once a quarter | Once a month | |
| Website Security Check | |||
| Website Security Check | Once a quarter | Once a month | |
| Active Vulnerability Scan | |||
| Active Vulnerability Scan | Once a month | Once a week | |
| DNS Analyze | |||
| DNS Analyze | |||
| Network Vulnerability Intelligence | |||
| Network Vulnerability Intelligence | |||
| Service Detector | |||
| Service Detector | |||
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO DIGITAL RISK PROTECTION MODULE
| ESSENTIAL | ADVANCED | EXCLUSIVE | |
|---|---|---|---|
| PII Detection (Employee & Customer Credentials (username/password)) | |||
| PII Detection (Employee & Customer Credentials (username/password)) | |||
| Rogue and Impersonating Mobile Application Detection | |||
| Rogue and Impersonating Mobile Application Detection | |||
| Reputation Monitoring | |||
| Reputation Monitoring | IP Reputation | IP, SMTP Server, and Domain Reputation | IP, SMTP Server, and Domain Reputation |
| Social Media Monitoring | |||
| Social Media Monitoring | Twitter Only (Up to 10 Keywords) | Twitter Only | Twitter Only |
| Phishing Domain Detection & Tracking | |||
| Phishing Domain Detection & Tracking | Domain Detection Only | Domain Detection & Tracking | Real-time Domain/Subdomain (Detection & Tracking) |
| Impersonating Social Media Account Detection | |||
| Impersonating Social Media Account Detection | Instagram/YouTube/Twitter | Instagram/YouTube/Twitter + Facebook, LinkedIn | |
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.
ECHO CYBER THREAT INTELLIGENCE MODULE
| ESSENTIAL | ADVANCED | EXCLUSIVE | |
|---|---|---|---|
| Threat Investigation (Brand Search) | |||
| Threat Investigation (Brand Search) | 100 queries/month (1200 queries in total) | 500 queries/month (6000 queries in total) | 1250 queries/month (15000 queries in total) |
| Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.) | |||
| Threat Feeds/IOCs Integration (Endpoint Security Solutions, SIEM, etc.) | API | API | |
| Indicator of Compromise Investigation | |||
| Indicator of Compromise Investigation | |||
| Historical Threat Intelligence Data | |||
| Historical Threat Intelligence Data | |||
| Git Tracker (Github Investigation) | |||
| Git Tracker (Github Investigation) | |||
| Vulnerability Tracking | |||
| Vulnerability Tracking | |||
| OSINT Investigation | |||
| OSINT Investigation | |||
| Cyber Security News | |||
| Cyber Security News | |||
| Darknet and Deepweb News | |||
| Darknet and Deepweb News | |||
| IOCs Portal/Threat Feeds Access | |||
| IOCs Portal/Threat Feeds Access | |||
| Cyber Threat Report Access | |||
| Cyber Threat Report Access | |||
| TTP/Threat Actor Monitoring and Reporting | |||
| TTP/Threat Actor Monitoring and Reporting | |||
| Area/Regional Intelligence | |||
| Area/Regional Intelligence | |||
*The list above is for brief information only. For detailed subscription breakdowns of licenses, please contact sales.