D1 defend Plans - D1 Defend D1 Defend

D1 defend Plans - D1 Defend D1 Defend

x
image hero Subpages

Choose Your Service Plan

CORE DEFEND ($85.00)

Pillar 1: Cyber Threat Prevention Per User / Monthly
Advanced AI-Enabled Endpoint Protection
Dark-web Monitoring & Scanning
Email SPAM Filtering, Encryption, & Compliance Archiving
Phishing Simulation Campaigns
End User Security Awareness & Compliance Training
Advanced Cyber Threat Hunting
Intrusion Prevention & Detection
Security Focused Workflow Automations to escalate as needed
Identity Access Management & Security
Mobile Device Management & Security
Secure Remote Workforce Connectivity
Zero-Trust Role-Based Access Policies & Procedures for Web/Internal
Applications
High Security Password Management & Multi-Factor Authentication
Device Data Encryption & Management
24x7 Security Information and Event Monitoring
24x7 US-Based Security Operations Center
24x7 Security Expert Team on Standby
Pillar 2: Proactive Management Per User / Monthly
Comprehensive Patch Management
Automated Self-Healing
Automated Ticket Generation & Escalation
Automatic Nightly Onsite Transfer of Data
24x7 US-Based Network Operations Center
24x7 Network Monitoring & Crucial Services Alerting
Security Rules Based Network Control
Routing Network Maintenance
24x7 Backup Monitoring, Verification, & Reporting
Periodic Testing of the Restore Process and Device Continuity
Pillar 3: Rapid Support & Resolution Per User / Monthly
Live Answer Technical Experts
90% First Call Resolution Rate
Humbly Confident Unlimited Support
One Call for ALL Vendor Management
Rapid Remote Resolution
Onsite Support as Needed
Support your Entire Organization
Comprehensive Trouble-Ticketing System and Escalation Process
Support for Mobile Devices
Pillar 4: Expert Strategic Advisory Per User / Monthly
Fractional Chief Technology/Security Officer
Scheduled Technology Business & Executive Risk Reviews
Technical Project Planning & Management
Business Continuity & Disaster Recovery Planning
Technology & Security Policies
Suggested Technology & Data Access Policies integrated with Employee Handbook
BYOD Policies & Support

PRO DEFEND ($175.00)

Pillar 1: Cyber Threat Prevention Per User / Monthly
Advanced AI-Enabled Endpoint Protection
Dark-web Monitoring & Scanning
Email SPAM Filtering, Encryption, & Compliance Archiving
Phishing Simulation Campaigns
End User Security Awareness & Compliance Training
Advanced Cyber Threat Hunting
Intrusion Prevention & Detection
Security Focused Workflow Automations to escalate as needed
Identity Access Management & Security
Mobile Device Management & Security
Secure Remote Workforce Connectivity
Zero-Trust Role-Based Access Policies & Procedures for Web/Internal
Applications
High Security Password Management & Multi-Factor Authentication
Device Data Encryption & Management
24x7 Security Information and Event Monitoring
24x7 US-Based Security Operations Center
24x7 Security Expert Team on Standby
Pillar 2: Proactive Management Per User / Monthly
Comprehensive Patch Management
Automated Self-Healing
Automated Ticket Generation & Escalation
Automatic Nightly Onsite Transfer of Data
24x7 US-Based Network Operations Center
24x7 Network Monitoring & Crucial Services Alerting
Security Rules Based Network Control
Routing Network Maintenance
24x7 Backup Monitoring, Verification, & Reporting
Periodic Testing of the Restore Process and Device Continuity
Pillar 3: Rapid Support & Resolution Per User / Monthly
Live Answer Technical Experts
90% First Call Resolution Rate
Humbly Confident Unlimited Support
One Call for ALL Vendor Management
Rapid Remote Resolution
Onsite Support as Needed
Support your Entire Organization
Comprehensive Trouble-Ticketing System and Escalation Process
Support for Mobile Devices
Pillar 4: Expert Strategic Advisory Per User / Monthly
Fractional Chief Technology/Security Officer
Scheduled Technology Business & Executive Risk Reviews
Technical Project Planning & Management
Business Continuity & Disaster Recovery Planning
Technology & Security Policies
Suggested Technology & Data Access Policies integrated with Employee Handbook
BYOD Policies & Support

360 DEFEND ($290.00)

Pillar 1: Cyber Threat Prevention Per User / Monthly
Advanced AI-Enabled Endpoint Protection
Dark-web Monitoring & Scanning
Email SPAM Filtering, Encryption, & Compliance Archiving
Phishing Simulation Campaigns
End User Security Awareness & Compliance Training
Advanced Cyber Threat Hunting
Intrusion Prevention & Detection
Security Focused Workflow Automations to escalate as needed
Identity Access Management & Security
Mobile Device Management & Security
Secure Remote Workforce Connectivity
Zero-Trust Role-Based Access Policies & Procedures for Web/Internal
Applications
High Security Password Management & Multi-Factor Authentication
Device Data Encryption & Management
24x7 Security Information and Event Monitoring
24x7 US-Based Security Operations Center
24x7 Security Expert Team on Standby
Pillar 2: Proactive Management Per User / Monthly
Comprehensive Patch Management
Automated Self-Healing
Automated Ticket Generation & Escalation
Automatic Nightly Onsite Transfer of Data
24x7 US-Based Network Operations Center
24x7 Network Monitoring & Crucial Services Alerting
Security Rules Based Network Control
Routing Network Maintenance
24x7 Backup Monitoring, Verification, & Reporting
Periodic Testing of the Restore Process and Device Continuity
Pillar 3: Rapid Support & Resolution Per User / Monthly
Live Answer Technical Experts
90% First Call Resolution Rate
Humbly Confident Unlimited Support
One Call for ALL Vendor Management
Rapid Remote Resolution
Onsite Support as Needed
Support your Entire Organization
Comprehensive Trouble-Ticketing System and Escalation Process
Support for Mobile Devices
Pillar 4: Expert Strategic Advisory Per User / Monthly
Fractional Chief Technology/Security Officer
Scheduled Technology Business & Executive Risk Reviews
Technical Project Planning & Management
Business Continuity & Disaster Recovery Planning
Technology & Security Policies
Suggested Technology & Data Access Policies integrated with Employee Handbook
BYOD Policies & Support

COMPARISON PLAN

Pillar 1: Cyber Threat Prevention CORE DEFEND ($85.00) PRO DEFEND ($175.00) 360 DEFEND ($290.00)
Advanced AI-Enabled Endpoint Protection
Dark-web Monitoring & Scanning
Email SPAM Filtering, Encryption, & Compliance Archiving
Phishing Simulation Campaigns
End User Security Awareness & Compliance Training
Advanced Cyber Threat Hunting
Intrusion Prevention & Detection
Security Focused Workflow Automations to escalate as needed
Identity Access Management & Security
Mobile Device Management & Security
Secure Remote Workforce Connectivity
Zero-Trust Role-Based Access Policies & Procedures for Web/Internal
Applications
High Security Password Management & Multi-Factor Authentication
Device Data Encryption & Management
24x7 Security Information and Event Monitoring
24x7 US-Based Security Operations Center
24x7 Security Expert Team on Standby
Pillar 2: Proactive Management CORE DEFEND ($85.00) PRO DEFEND ($175.00) 360 DEFEND ($290.00)
Comprehensive Patch Management
Automated Self-Healing
Automated Ticket Generation & Escalation
Automatic Nightly Onsite Transfer of Data
24x7 US-Based Network Operations Center
24x7 Network Monitoring & Crucial Services Alerting
Security Rules Based Network Control
Routing Network Maintenance
24x7 Backup Monitoring, Verification, & Reporting
Periodic Testing of the Restore Process and Device Continuity
Pillar 3: Rapid Support & Resolution CORE DEFEND ($85.00) PRO DEFEND ($175.00) 360 DEFEND ($290.00)
Live Answer Technical Experts
90% First Call Resolution Rate
Humbly Confident Unlimited Support
One Call for ALL Vendor Management
Rapid Remote Resolution
Onsite Support as Needed
Support your Entire Organization
Comprehensive Trouble-Ticketing System and Escalation Process
Support for Mobile Devices
Pillar 4: Expert Strategic Advisory CORE DEFEND ($85.00) PRO DEFEND ($175.00) 360 DEFEND ($290.00)
Fractional Chief Technology/Security Officer
Scheduled Technology Business & Executive Risk Reviews
Technical Project Planning & Management
Business Continuity & Disaster Recovery Planning
Technology & Security Policies
Suggested Technology & Data Access Policies integrated with Employee Handbook
BYOD Policies & Support
Site & Network Management Hourly* Hourly*
Firewall Management (If applicable) Hourly* Hourly*
Server Management (If applicable) Hourly* Hourly*
Onboarding and Deployment - One Time Fee Hourly* Hourly*
Estimated number of hours to Onboard
*Discounted Hourly Rate: $225.00 per hour
Schedule a Call