SAPLING

The Sapling license is MYRMEX’s protection with Extended Detection and Response to bring visibility and protection to computers and servers. It increases your data collection capability to analyze the behavior of server operating systems.

Feature Details by Category

Firewall

  • Functionality: Monitoring and Auditing (Firewall activity monitoring).
  • Ideal for:
    • Companies with few units or branches, with up to 20 users per unit.
    • Scenarios requiring active monitoring and continuous auditing of firewall activities.
    • Environments needing an intermediate level of visibility and firewall control.

Endpoint Protection (Windows/Linux/MacOS)

  • Functionality: Next-Generation Protection.
  • Ideal for:
    • High-risk workstations, such as users with access to sensitive data or critical systems.
    • Application servers with low operational impact, where availability is not critical, but security is still needed.
    • Environments requiring more advanced protection against modern threats like ransomware or fileless attacks.

Cloud Identity

  • Functionality: Visibility of resources implemented in the cloud.
  • Ideal for:
    • Environments with monthly costs up to US$ 750, especially associated with moderate production workloads.
    • Organizations wishing to map resources implemented in the cloud with greater depth.
    • Contexts where visibility into the structure and use of resources is essential for cost control and security.

Office365

  • Functionality: Administrative inventory and Threat Detection in Accounts (administrative account monitoring).
  • Ideal for:
    • Growing environments with more administrative accounts and greater need for control over Office 365 usage.
    • Companies wishing to perform administrative inventory and detect threats related to compromised accounts or misconfigurations.
    • Useful for preventing privilege escalation, unauthorized access, or suspicious activities based on more robust monitoring policies.

User Monitoring (Data Leakage & Integration Threats)

  • Functionality: Social media and Website posture.
  • Ideal for:
    • Users who constantly demand use of technology and require a more rigid level of digital monitoring.
    • Users working in areas such as marketing, commercial, financial, or legal, where online presence on social media and websites represents a risk vector.
    • Profiles requiring Cybersecurity Assistant guidance with real-time practical tips.

Digital Asset Monitoring (Essential)

  • Functionality: Configuration Analysis and Technical Compliance.
  • Ideal for:
    • More relevant internal domains, such as those supporting critical applications, authentication, institutional emails, or corporate systems.
    • Situations where an eventual failure or compromise could affect internal operations or cause damage to the organization.
    • Recommended for companies needing to elevate the level of protection for their key internal digital assets.

User Monitoring (Deep & Dark Web)

  • Not applicable at this license tier.

Domain/Site/Email Registry Security

  • Not applicable at this license tier.