MYRMEX AI DOCS home page
Search...
⌘K
Support
Plataform
Plataform
Search...
Navigation
License
TRUNK
Documentation
Community
Blog
Get Started
Welcome
Quickstart
Installation
Development
Introduction
License
FAQ
Plataform
Hyper-personalization
Cloud Security
Cloud Data Management
AI Platform
Multi Agents AI System
Agent Endpoint Security
Alerts
Logs
Agent Endpoint Security
Architecture
Installation
Endpoint mode
Collector mode
Communication
Features
Integrations
Quickstart
AWS
OCI
Office365
Trend Micro
Fortinet
Management
Account Management
Organization Switching
Data Protection
License
SEED
SAPLING
TRUNK
LEAVES
Policies
Privacy policy
On this page
Feature Details by Category
Firewall
Endpoint Protection (Windows/Linux/MacOS)
Cloud Identity
Office365
User Monitoring (Data Leakage & Integration Threats)
Digital Asset Monitoring (Essential)
User Monitoring (Deep & Dark Web)
Domain/Site/Email Registry Security
License
TRUNK
TRUNK
The Trunk license offers advanced features for visibility and protection for computers, servers, and integrations. Data enrichment with integrations enables deep environment analysis.
Feature Details by Category
Firewall
Functionality:
Threat and Anomaly Detection (advanced functions for anomaly detection).
Ideal for:
Edge devices in units with more than 30 users.
Environments with intense traffic and greater operational complexity.
Organizations demanding advanced threat and anomaly detection features.
Endpoint Protection (Windows/Linux/MacOS)
Functionality:
Threat and Anomaly Detection (advanced functions for anomaly detection).
Ideal for:
Servers with external access, such as APIs, web applications, or systems in DMZ.
Systems with medium operational risk, but which still require detection of anomalies and suspicious behavior.
Organizations needing continuous monitoring and analysis of threats in their most exposed assets.
Cloud Identity
Functionality:
Auditing and Anomaly Detection.
Ideal for:
Cloud environments up to US$ 1,000/month, with critical applications requiring auditability.
Systems needing continuous auditing and anomaly detection capabilities related to identity, network, and computational resources.
Environments with moderate security levels, where ensuring integrity and compliance is necessary.
Office365
Functionality:
Threat and Anomaly Detection (advanced functions for threat detection).
Ideal for:
Environments with fewer than 15 users, but with a need for anomaly and threat detection.
Companies, even small ones, operating in sectors with high compliance requirements (such as legal, financial, or health).
Ideal when precise analysis of suspicious behaviors with greater depth is needed to ensure proactive security.
User Monitoring (Data Leakage & Integration Threats)
Not applicable at this license tier.
Digital Asset Monitoring (Essential)
Not applicable at this license tier.
User Monitoring (Deep & Dark Web)
Functionality:
Personal Visibility and Deep & Dark Web Monitoring.
Ideal for:
Users with extensive digital presence, online activity, or influence inside or outside the company.
Users requiring continuous visibility of their digital identity and monitoring on the Deep & Dark Web to detect fraud or unauthorized mentions.
Especially indicated for managers, executives, and brand representatives.
Domain/Site/Email Registry Security
Functionality:
Security Inspection and Exposure Posture.
Ideal for:
Little-used external domains, old landing pages, reserved brand domains, or web addresses that do not store or process sensitive data.
Scenarios where external exposure exists, but the associated risks are considered moderate or low.
Indicated for maintaining a minimum posture of scanning and detection of possible explorations or misuse.
SAPLING
LEAVES
Assistant
Responses are generated using AI and may contain mistakes.