TRUNK
The Trunk license offers advanced features for visibility and protection for computers, servers, and integrations. Data enrichment with integrations enables deep environment analysis.
Feature Details by Category
Firewall
- Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
- Ideal for:
- Edge devices in units with more than 30 users.
- Environments with intense traffic and greater operational complexity.
- Organizations demanding advanced threat and anomaly detection features.
Endpoint Protection (Windows/Linux/MacOS)
- Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
- Ideal for:
- Servers with external access, such as APIs, web applications, or systems in DMZ.
- Systems with medium operational risk, but which still require detection of anomalies and suspicious behavior.
- Organizations needing continuous monitoring and analysis of threats in their most exposed assets.
Cloud Identity
- Functionality: Auditing and Anomaly Detection.
- Ideal for:
- Cloud environments up to US$ 1,000/month, with critical applications requiring auditability.
- Systems needing continuous auditing and anomaly detection capabilities related to identity, network, and computational resources.
- Environments with moderate security levels, where ensuring integrity and compliance is necessary.
Office365
- Functionality: Threat and Anomaly Detection (advanced functions for threat detection).
- Ideal for:
- Environments with fewer than 15 users, but with a need for anomaly and threat detection.
- Companies, even small ones, operating in sectors with high compliance requirements (such as legal, financial, or health).
- Ideal when precise analysis of suspicious behaviors with greater depth is needed to ensure proactive security.
User Monitoring (Data Leakage & Integration Threats)
- Not applicable at this license tier.
Digital Asset Monitoring (Essential)
- Not applicable at this license tier.
User Monitoring (Deep & Dark Web)
- Functionality: Personal Visibility and Deep & Dark Web Monitoring.
- Ideal for:
- Users with extensive digital presence, online activity, or influence inside or outside the company.
- Users requiring continuous visibility of their digital identity and monitoring on the Deep & Dark Web to detect fraud or unauthorized mentions.
- Especially indicated for managers, executives, and brand representatives.
Domain/Site/Email Registry Security
- Functionality: Security Inspection and Exposure Posture.
- Ideal for:
- Little-used external domains, old landing pages, reserved brand domains, or web addresses that do not store or process sensitive data.
- Scenarios where external exposure exists, but the associated risks are considered moderate or low.
- Indicated for maintaining a minimum posture of scanning and detection of possible explorations or misuse.