-
BLUEVOYANT
BlueVoyant Social Media Impersonation Monitors fake social media accounts - Facebook, Twitter, Instagram, and LinkedIn i - TI-SOCIALMEDIAIMPERSONATION-T1-SHIBlueVoyants Social Media Impersonation Monitors fake social media accounts - Facebook, Twitter, Instagram, and LinkedIn includes executive accounts. Up to 1 account- 24/7 Support
-
BLUEVOYANT
BlueVoyant App Impersonation monitors rogue apps on official and unofficial app stores. Up to 2 apps - TI-APPIMPERSONATION-T1-SHIBlueVoyants App Impersonation monitors rogue apps on official and unofficial app stores. Up to 2 apps- 24/7 Support
-
BLUEVOYANT
BlueVoyant Scan & Protect combines DarkWeb Monitoring with Brand Protection services to proactively uncover threats and protect digital assets - TI-SCANANDPROTECT-T3-SHIScan & Protect combines DarkWeb Monitoring with Brand Protection services to proactively uncover threats and protect digital assets- 24/7 Support
-
BLUEVOYANT
BlueVoyant Scan & Protect combines DarkWeb Monitoring with Brand Protection services to proactively uncover threats and protect digital assets - TI-SCAN&PROTECT-T4Scan & Protect combines DarkWeb Monitoring with Brand Protection services to proactively uncover threats and protect digital assets (up to 16 keywords + up to 7 social media keywords + up to 8 apps + unlimited number of takedowns + up to 15 domains and...- 24/7 Support
-
BLUEVOYANT
BlueVoyant Brand Protection that Combines the power of App, Social Media and Web Impersonation into one solution. Proactively detects and disrupts phishing attacks, fake social media accounts, and rogue applications - TI-DIGITALBRANDPROTECTION-T4Combines the power of App, Social Media and Web Impersonation into one solution. Proactively detects and disrupts phishing attacks, fake social media accounts, and rogue applications to protect your brand outside your perimeter. Up to 16 keywords + 8...- 24/7 Support
-
BLUEVOYANT
BlueVoyant Supplier Questionnaire module - TI-3PR-CYBERRISK-QAR-SHIBlueVoyants Supplier Questionnaire module- 24/7 Support
-
BLUEVOYANT
BlueVoyant systematical, enumeration and mapping of in-scope network segments - Identify potential vulnerabilities and Perform simulated attacks against these vulnerabilities - PSO-PT-MAN-SHISystematically enumerate and map in-scope network segments - Identify potential vulnerabilities against these segments - Perform simulated attacks against these vulnerabilities with the primary goal of gaining administrative- 24/7 Support
-
BLUEVOYANT
BlueVoyant systematical, enumeration and mapping of in-scope network segments, identify potential vulnerabilities - PSO-PT-AUTO-SHIBlueVoyantwill systematically enumerate and map in-scope network segments, identify potential vulnerabilities against these segments- 24/7 Support
-
BLUEVOYANT
BlueVoyant Hands-on services that include onboarding and baseline configuration for the MDR Splunk Cloud Platform - MSS-SPLUNK-DEPLOYMENT-ENTERPRISEHands-on services that include onboarding and baseline configuration for the MDR Splunk Cloud Platform- 24/7 Support
-
BLUEVOYANT
BlueVoyant Managed M365 Security Subscription - MSS-SIEM-SERVICE-XDR-SENTINELManaged M365 Security Subscription- 24/7 Support
-
- 24/7 Support
-
BLUEVOYANT
BlueVoyant Managed M365 Security Subscription - MSS-MS-DEPLOYMENT-XDR-SMC-MSSManaged M365 Security Subscription- 24/7 Support
BLUEVOYANT
ProVision Platform | Managed Detection and Response | Cybersecurity Solutions | Cyber Security Monitoring & Alerting | Security Device Management | Cybersecurity as a Service (CSaaS) | Third-Party Patch Management | Incident Response | Threat Intelligence | Dark Web Monitoring | Cybersecurity Ins | Certifications & Credentials | Security Testing & Assessments | Social Engineering | Compliance Services | Healthcare Vendor Management | Vendor Management Services
Certifications & Credentials | Security Testing & Assessments | Social Engineering | Compliance Services | Healthcare Vendor Management | Vendor Management Services