pandora threatscout

Securing Your Enterprise

How we protect your exposures

How it communicates with Pandora SOC

process_communicate1 | Pandora Labs

Step 1:

Logs will be coming from different types of end point. Logs will be sent to the ThreatScout SIEM.

process_exposure2.2 | Pandora Labs

Step 2:

ThreatScout correlates data and informs the Pandora SOC of alerts.

 

Step 5:

Client views ThreatScout SIEM Console for the alerts, events and reports via HTTPS on their site.

pandora_soc_logo

Step 3:

Pandora SOC can push signature & correlation directive updates to the client’s ThreatScout SIEM through HTTPS.

 

Step 4:

If the need arises for the Pandora SOC engineers can request access to the SIEM via SSH.

Why you need us

Incident Handling is responsible for the identification of threats and the timely and effective handling of incidents across the IT infrastructure.

  • PEOPLE: Incident Response Team
  • PROCESS: Threat Intelligence
  • PRODUCT: FW, IDS, WAF, AV, etc.
process_incident_handling | Pandora Labs
pandora threatscout

Next Generation SIEM & TDI Platform

ThreatScout pricing

Micro Tier

 

1 GB per day logs

Unlimited number of log sources

 

Php 22,000/month

Recommended

Small Tier

 

 2 GB per day logs

Unlimited number of log sources

 

Php 39,000/month

Medium Tier

 

5 GB per day logs

Unlimited number of log sources

 

Php 98,000/month

Large Tier

 

10 GB per day logs

Unlimited number of log sources

 

Php 180,000/month

Note: All prices are VAT exclusive. Higher Tiers are available upon request