LEAVES
With the Leaves license, AI agents correlate user data in real-time, identifying behavior and data leakage, enriched by anomaly and threat analysis on computers, servers, and integrations.
Feature Details by Category
Firewall
- Functionality: Advanced Protection and Automation (resource and connection protection).
- Ideal for:
- Edge devices in units with more than 50 users.
- Equipment acting as firewalls in segmented internal networks.
- Critical infrastructures, on-premises data centers, or cloud environments.
- Environments requiring robust protection, response automation, and high availability.
Endpoint Protection (Windows/Linux/MacOS)
- Functionality: Advanced Protection and Automation.
- Ideal for:
- Business-critical servers, such as core databases, ERPs, sensitive data repositories, or domain controllers.
- Infrastructures with high impact and risk, where any failure or attack could significantly compromise operations.
- Environments requiring next-generation protection, response automation, and strict security policies.
Cloud Identity
- Functionality: Advanced Protection and Automation.
- Ideal for:
- Critical and high-cost environments.
- Intensive workloads, mission-critical services, high-availability clusters, or sensitive data infrastructure.
- Organizations needing advanced protection, orchestration of automated response, and real-time incident response.
Office365
- Functionality: Advanced Protection and Automation (resource and account protection).
- Ideal for:
- Environments with more than 15 users, especially when various administrative roles and profiles exist.
- Organizations needing protection of account data, response automation to suspicious events, and complete control over policies and permissions.
- Recommended for companies wanting to maximize security, reduce incident response time, and protect corporate data on a large scale.
User Monitoring (Data Leakage & Integration Threats)
- Not applicable at this license tier.
Digital Asset Monitoring (Essential)
- Not applicable at this license tier.
User Monitoring (Deep & Dark Web)
- Functionality: Advanced Analysis and Automation.
- Ideal for:
- Users dealing with sensitive, strategic, or regulated data, such as directors, C-levels, or personnel responsible for critical areas.
- Profiles requiring advanced behavioral analysis capabilities, identification of targeted threats, and automation of personal and corporate protection responses.
- Recommended for environments with high risk of espionage, data leakage, or targeted attacks.
Domain/Site/Email Registry Security
- Functionality: Advanced Analysis and Content Monitoring.
- Ideal for:
- Highly accessed public domains, such as corporate portals, login systems, exposed APIs, or customer-facing critical services.
- Domains processing, storing, or transmitting sensitive information, such as personal, financial, or strategic data.
- Essential for guaranteeing maximum protection, visibility, and regulatory compliance.
Advanced Data Management
MYRMEX is a cybersecurity intelligence platform designed to offer not only efficient response operations, but also robust and flexible data management. The ability to manage large volumes of data enables a broad context of analysis for auditing and operations.Large-Scale Data Management for AI Agents
Large-Scale Data Management for AI Agents
Large-scale data management was designed to handle massive volumes of events. Unlike solutions that impose data limits to maintain solution performance, MYRMEX ensures that your Artificial Intelligence (AI) agents have access to all the data volume necessary to operate with maximum effectiveness. This approach ensures that event analysis context is not compromised by performance limitations, allowing a complete and deep view of your security environment. This capability is provided in the leaves package with 85.33G/Day, which can be expanded with third-party integration or within the platform through add-ons. The platform’s objective is to simplify your operation, eliminating concerns about infrastructure and hidden costs.
Cloud-Native Architecture and Dynamic Scalability
Cloud-Native Architecture and Dynamic Scalability
Our solution is 100% cloud-based, bringing incomparable agility and resilience. Thanks to its Cloud-Native architecture, the platform has the intrinsic capacity to scale dynamically according to usage volume and data demand. This means that MYRMEX can efficiently manage large volumes of events, adapting to your growth needs without interruptions or performance degradation.
Responsibility and Flexibility
Responsibility and Flexibility
Integrity and security are our priority. The entire solution control hierarchy incorporates a robust Role-Based Access Control (RBAC) system. With this feature it is possible to Define Custom Access Profiles, Assign Minimum Necessary Permissions, Manage Access to Sensitive Data and Enhanced Audit and Compliance.Additionally, through the integration feature we bring the flexibility to connect to other data sources that may be hosted in your Cloud and Datacenter, in case your organization has specific data sovereignty requirements or existing infrastructure.To provide a better experience in using the solution, according to user interaction the platform can provide visibility on the data consulted considering within the context the type of request and the requested period.