EOC Parallax image

Service Packages

Prevailion cyber intelligence is available on a subscription basis.

You can access our data in our zero-touch platform called, APEX or as a data feed via one of our Axis Intelligence subscription options.

APEX™ Entity

Experience the power of Prevailion’s APEX™ Platform for your organization

APEX™ Entity empowers organizations with exclusive insight into their real-time state of compromise.

 

APEX™ Seeker

APEX™ Seeker provides a unique user experience that enables subscribers in confirming the state of compromise of a third-party organization while gaining a high-level understanding of its severity.

users who subscribe and become APEX™ Seeker customers will be armed with information and intelligence that will enable them to act proactively in applying Boundless Vision™ Pack credits satisfying several uses cases including:

 

Boundless Vision Packs

Continuously Monitor Compromised Partners and Suppliers

Vision Packs™ are comprised of ten (10) organizational credits. Through the acquisition of Boundless Vision packs, organizations are now capable of acquiring real-time threat intelligence that directly reflects the state of compromise of their third-party partners and supply chain vendors.

Through the use and application of Boundless Vision Pack credits, organizations now have the ability to purchase rich telemetry and intelligence related to any organization it may have an interest in in order to satisfy several use cases including:

 

APEX™ Enterprise

Continuously Monitor Compromised Partners and Suppliers at Enterprise Scale

For organizations requiring an enterprise grade approach in terms of size and scope Prevailion enables organizations in acquiring real-time threat intelligence that directly reflects the state of compromise of their third-party partners and supply chain vendors in volume. For organizations growing toward or requiring 60 or more Boundless Vision Packs, APEX™ Enterprise is appropriate.

Organizations will have the ability to purchase rich telemetry and intelligence related to any organization it may have an interest in in order to satisfy several use cases including:

 

Axis™ Intelligence

Telemetry collected from attacker infrastructure

Axis Intelligence, is offered as Industry, Geographic, Threat feeds or as Global, an aggregate of all three, that refreshes every 24 hours. Easy to use and customizable, it can be set up to track emerging threats across any desired range of companies, industries or geographic regions, as well as to monitor specific nation-states, criminal threat actors and hundreds of malware families.

 

APEX™ SEEKER

Key Features
  • Zero touch deployment (Simple web-based login)
  • Identify the state of compromise within your organization
  • Search by keyword, IP Address, CIDR for state of compromise within the APEX platform
  • Compromise intensity (Severe | Critical | Elevated | Stable)
  • Compromise trend indication
  • Intuitive user interface
Contact us for pricing

VISION PACKS

Key Features
  • Zero touch deployment (Simple web-based login)
  • Identify the state of compromise within your organization
  • Search by keyword, IP Address, CIDR for state of compromise within the APEX platform
  • Compromise intensity (Severe | Critical | Elevated | Stable)
  • Compromise trend indication
  • Condensed historical compromise preview
  • Entity detail page including historicity (e.g. dwell time, authenticity, accuracy)
  • Detailed telemetry export
  • Intuitive user interface
Contact us for pricing

APEX™ ENTERPRISE

Key Features
  • Zero touch deployment (Simple web-based login)
  • Identify the state of compromise within your organization
  • Search by keyword, IP Address, CIDR for state of compromise within the APEX platform
  • Compromise intensity (Severe | Critical | Elevated | Stable)
  • Compromise trend indication
  • Condensed historical compromise preview
  • Entity detail page including historicity (e.g. dwell time, authenticity, accuracy)
  • Detailed telemetry export
  • Supply-chain/third-party portfolio development
  • Daily compromise status update alerting
  • Intuitive user interface
Contact us for pricing

AXIS™ INTELLIGENCE

Key Features
  • The compromise status of IP address(es) within your organization and third-parties
  • Threat type, threat actor and campaign
  • Time window (Dwell Time)
  • Retrospective analysis of compromise
  • First beacon seen timestamp
  • Last beacon seen timestamp
  • Beacon counts (Frequency, Velocity and Cadence)
  • Available as Global, Threat, Industry or Geographic
  • Daily exports in JSONL format via a private S3 bucket.
Contact us for pricing
Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.