LEAVES

With the Leaves license, AI agents correlate user data in real-time, identifying behavior and data leakage, enriched by anomaly and threat analysis on computers, servers, and integrations.

Feature Details by Category

Firewall

  • Functionality: Advanced Protection and Automation (resource and connection protection).
  • Ideal for:
    • Edge devices in units with more than 50 users.
    • Equipment acting as firewalls in segmented internal networks.
    • Critical infrastructures, on-premises data centers, or cloud environments.
    • Environments requiring robust protection, response automation, and high availability.

Endpoint Protection (Windows/Linux/MacOS)

  • Functionality: Advanced Protection and Automation.
  • Ideal for:
    • Business-critical servers, such as core databases, ERPs, sensitive data repositories, or domain controllers.
    • Infrastructures with high impact and risk, where any failure or attack could significantly compromise operations.
    • Environments requiring next-generation protection, response automation, and strict security policies.

Cloud Identity

  • Functionality: Advanced Protection and Automation.
  • Ideal for:
    • Critical and high-cost environments.
    • Intensive workloads, mission-critical services, high-availability clusters, or sensitive data infrastructure.
    • Organizations needing advanced protection, orchestration of automated response, and real-time incident response.

Office365

  • Functionality: Advanced Protection and Automation (resource and account protection).
  • Ideal for:
    • Environments with more than 15 users, especially when various administrative roles and profiles exist.
    • Organizations needing protection of account data, response automation to suspicious events, and complete control over policies and permissions.
    • Recommended for companies wanting to maximize security, reduce incident response time, and protect corporate data on a large scale.

User Monitoring (Data Leakage & Integration Threats)

  • Not applicable at this license tier.

Digital Asset Monitoring (Essential)

  • Not applicable at this license tier.

User Monitoring (Deep & Dark Web)

  • Functionality: Advanced Analysis and Automation.
  • Ideal for:
    • Users dealing with sensitive, strategic, or regulated data, such as directors, C-levels, or personnel responsible for critical areas.
    • Profiles requiring advanced behavioral analysis capabilities, identification of targeted threats, and automation of personal and corporate protection responses.
    • Recommended for environments with high risk of espionage, data leakage, or targeted attacks.

Domain/Site/Email Registry Security

  • Functionality: Advanced Analysis and Content Monitoring.
  • Ideal for:
    • Highly accessed public domains, such as corporate portals, login systems, exposed APIs, or customer-facing critical services.
    • Domains processing, storing, or transmitting sensitive information, such as personal, financial, or strategic data.
    • Essential for guaranteeing maximum protection, visibility, and regulatory compliance.