TRUNK

The Trunk license offers advanced features for visibility and protection for computers, servers, and integrations. Data enrichment with integrations enables deep environment analysis.

Feature Details by Category

Firewall

  • Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
  • Ideal for:
    • Edge devices in units with more than 30 users.
    • Environments with intense traffic and greater operational complexity.
    • Organizations demanding advanced threat and anomaly detection features.

Endpoint Protection (Windows/Linux/MacOS)

  • Functionality: Threat and Anomaly Detection (advanced functions for anomaly detection).
  • Ideal for:
    • Servers with external access, such as APIs, web applications, or systems in DMZ.
    • Systems with medium operational risk, but which still require detection of anomalies and suspicious behavior.
    • Organizations needing continuous monitoring and analysis of threats in their most exposed assets.

Cloud Identity

  • Functionality: Auditing and Anomaly Detection.
  • Ideal for:
    • Cloud environments up to US$ 1,000/month, with critical applications requiring auditability.
    • Systems needing continuous auditing and anomaly detection capabilities related to identity, network, and computational resources.
    • Environments with moderate security levels, where ensuring integrity and compliance is necessary.

Office365

  • Functionality: Threat and Anomaly Detection (advanced functions for threat detection).
  • Ideal for:
    • Environments with fewer than 15 users, but with a need for anomaly and threat detection.
    • Companies, even small ones, operating in sectors with high compliance requirements (such as legal, financial, or health).
    • Ideal when precise analysis of suspicious behaviors with greater depth is needed to ensure proactive security.

User Monitoring (Data Leakage & Integration Threats)

  • Not applicable at this license tier.

Digital Asset Monitoring (Essential)

  • Not applicable at this license tier.

User Monitoring (Deep & Dark Web)

  • Functionality: Personal Visibility and Deep & Dark Web Monitoring.
  • Ideal for:
    • Users with extensive digital presence, online activity, or influence inside or outside the company.
    • Users requiring continuous visibility of their digital identity and monitoring on the Deep & Dark Web to detect fraud or unauthorized mentions.
    • Especially indicated for managers, executives, and brand representatives.

Domain/Site/Email Registry Security

  • Functionality: Security Inspection and Exposure Posture.
  • Ideal for:
    • Little-used external domains, old landing pages, reserved brand domains, or web addresses that do not store or process sensitive data.
    • Scenarios where external exposure exists, but the associated risks are considered moderate or low.
    • Indicated for maintaining a minimum posture of scanning and detection of possible explorations or misuse.