AI Content Chat (Beta) logo

In-House (3 locations; 50 employees) Security Operations attributes of provider Center (SOC) SOC(s) can operate 24/7/365 physically in U.S. and limit access to U.S. persons what is the minimum deal size you will consider for Minimum MRC for an ongoing security $3,000 Ongoing Security opportunity (i.e. MRC, managed services)? what is the minimum deal size you will consider for a Minimum NRC for One- one-time security $15,000 Time Security opportunity (i.e. NRC, professional services)? CASB is a software that monitors all activity to Cloud Access Security cloud applications and n/a Broker (CASB) enforces security policies on trafc destined for the cloud. scan hundreds of thousands of websites each day to look for Dark Web Monitoring personal/proprietary n/a information that criminals can use to steal private data how vendor solves the data loss problem, not Product: Avanan, Check necessarily a product! Point, Keepr Data Loss Prevention protect/prevent data (DLP) breaches, exltration, or DLP Solutions: Email, unwanted destruction of Identity sensitive data and comply with regulations Solution designed to block Distributed Denial of Service attacks from taking down a network or DDoS Mitigation n/a online application; especially relevant for companies who do business online Secure Email Gateway or Min. $3K MRC other product meant to Email Security detect malicious or Product: Check Point, fraudulent email content Mimecast service that stores and manages digital identities, Identity Provider (IdP) letting users manage Product: Azure AD, Duo access, adding, or removing privileges an organized, forensic approach to investigate Incident Response (IR) and remediate a security n/a breach; can be on-demand or via monthly retainer identify and prevent Kubernetes Security threats in Kubernetes n/a container environments

Thrive - Page 2 Thrive Page 1 Page 3