Skip to main content

TRUNK

The Trunk license offers advanced features for visibility and protection for computers, servers, and integrations. Data enrichment with integrations enables deep environment analysis.

Feature Details by Category

Firewall

  • Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
  • Ideal for:
    • Edge devices in units with more than 30 users.
    • Environments with intense traffic and greater operational complexity.
    • Organizations demanding advanced threat and anomaly detection features.

Endpoint Protection (Windows/Linux/MacOS)

  • Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
  • Ideal for:
    • Servers with external access, such as APIs, web applications, or systems in DMZ.
    • Systems with medium operational risk, but which still require detection of anomalies and suspicious behavior.
    • Organizations needing continuous monitoring and analysis of threats in their most exposed assets.

Cloud Identity

  • Functionality: Auditing and Anomaly Detection.
  • Ideal for:
    • Cloud environments up to US$ 1,000/month, with critical applications requiring auditability.
    • Systems needing continuous auditing and anomaly detection capabilities related to identity, network, and computational resources.
    • Environments with moderate security levels, where ensuring integrity and compliance is necessary.

Office365

  • Functionality: Threat and Anomaly Detection (advanced functions for threat detection).
  • Ideal for:
    • Environments with fewer than 15 users, but with a need for anomaly and threat detection.
    • Companies, even small ones, operating in sectors with high compliance requirements (such as legal, financial, or health).
    • Ideal when precise analysis of suspicious behaviors with greater depth is needed to ensure proactive security.

User Monitoring (Data Leakage & Integration Threats)

  • Not applicable at this license tier.

Digital Asset Monitoring (Essential)

  • Not applicable at this license tier.

User Monitoring (Deep & Dark Web)

  • Functionality: Personal Visibility and Deep & Dark Web Monitoring.
  • Ideal for:
    • Users with extensive digital presence, online activity, or influence inside or outside the company.
    • Users requiring continuous visibility of their digital identity and monitoring on the Deep & Dark Web to detect fraud or unauthorized mentions.
    • Especially indicated for managers, executives, and brand representatives.

Domain/Site/Email Registry Security

  • Functionality: Security Inspection and Exposure Posture.
  • Ideal for:
    • Little-used external domains, old landing pages, reserved brand domains, or web addresses that do not store or process sensitive data.
    • Scenarios where external exposure exists, but the associated risks are considered moderate or low.
    • Indicated for maintaining a minimum posture of scanning and detection of possible explorations or misuse.