No Level of Investment Prevents or Blocks 100% of Attacks
As the industry’s first managed detection and response (MDR) provider, our purpose-built technology and team of security experts work closely with each customer to understand your unique needs and business context, empowering you to identify and resolve whatever threats, breaches or gaps may come.
Intelligence Driven By Data and Humans
Security experts in our global Security Operations Center (SOC) leverage industry data, continuous research from our threat intelligence team, and machine-learning from aggregated data of thousands of customers. This knowledge provides you vital context about your risk of exposure and exploitation that leads to the most appropriate event response.
Security Insight Always at Your Fingertips
Our platform delivers real-time reporting, giving you access to information on risk, vulnerabilities, remediation activities, configuration exposures, and compliance status. With this intelligence, you can focus on a prioritized order of threats that need further triage, drill down into threats to act on or mitigate exposure, and provide intuitive risk visualization.
Real Security Experts Assigned to Your Account
People are a critical component of Fortra’s Alert Logic MDR solution. Each customer is assigned a broad range of security, technology, and customer success professionals who provide a personalized level of service that considers the unique context of your organization.
Scalable MDR Platform
Our proprietary platform analyzes network traffic and more than 140 billion log messages each day. This provides coverage across your entire attack surface and brings together asset visibility and security analytics for cloud, networks, applications, and endpoints in cloud, on-premises, and hybrid environments.
Tailored Protection
to Each Asset in Your Estate
Our offerings work together across your environments to give you the right coverage with the right resources.
SERVICE ELEMENTS | MDR Essentials | MDR Professional | MDR Enterprise† |
Implementation | ◉ | ◉ | ◉ |
24/7 Platform | ◉ | ◉ | ◉ |
Vulnerability | ◉ | ◉ | ◉ |
PCI Dispute & PCI DSS & ASV Program Support | ◉ | ◉ | ◉ |
Customer Success Team | ◉ | ◉ | |
24/7 Threat Management | ◉ | ◉ | |
15-minute Escalation SLA | ◉ | ◉ | |
Emerging Threat Response | ◉ | ◉ | |
On-demand Tuning & Sensor Optimization | ◉ | ◉ | |
Machine Learning Log Review | ◉ | ◉ | |
Team of Cyber Risk Experts | ◉ | ||
Bespoke Threat Hunting | ◉ | ||
Proactive Tuning & Detection Optimization | ◉ | ||
Security Posture Consultation | ◉ | ||
Tailored Response Playbooks | ◉ | ||
Biweekly Security Review | ◉ | ||
Annual Virtual Stakeholders Meeting | ◉ |
FEATURES | MDR Essentials | MDR Professional | MDR Enterprise† |
Hybrid Asset Discovery | ◉ | ◉ | ◉ |
Internal & External Vulnerability Scanning | ◉ | ◉ | ◉ |
Cloud Configuration Checks/CIS Benchmarks | ◉ | ◉ | ◉ |
Endpoint Detection | ◉ | ◉ | ◉ |
PCI Scanning | ◉ | ◉ | |
File Integrity Monitoring | ◉ | ◉ | |
Network Monitoring | ◉ | ◉ | |
Log Data Monitoring | ◉ | ◉ | |
Log Collection & Search with 12 Month Retention * | ◉ | ◉ | |
Web Log Analytics | ◉ | ◉ | |
Real-time Reporting & Dashboards | ◉ | ◉ | ◉ |
Cloud Security Service Integration | ◉ | ◉ | |
Cloud Change Monitoring | ◉ | ◉ | |
User Behavior Monitoring | ◉ | ◉ |
* Log retention is always online, no restriction on search window exists and more than 12 months retention is available upon request