YOUR CYBERSECURITY
FROM 29€ PER MONTH.

compare our offers

Device protection

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
Equipment protection
Protection against phishing
Anti-virus protection
Ransomware protection
Protection and control of connections (USB, wifi, bluetooth)
Hard disk encryption
Smartphone protection (iOS & Android phones and tablets)
Protection against phishing
Anti-virus protection
Block dangerous websites and hacking attempts
Protect your real IP address and your web browsing
Protection statistics
Protection on public Wi-Fi networks

Network analysis

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
Next generation firewall
Management of incoming and outgoing flows
VPN access
Next generation functionality
Update every 2 hours without reboot
Wifi functionality
Control panel (administration console)
Anti-virus
IPS Intrusion prevention system
Anti-Bot
SSL Inspection
Application control
Operation via a mobile application
Human monitoring of threats and attacks on your business
24/7 filtering and monitoring of toxic flows
Traceability of flows
Report creation
Dashboard to monitor cyber threat activity
Detection of abnormal internet consumption
RGPD Compliance
Automatic update: to avoid any threat
Calculating your cyber carbon 🌿
Human monitoring of threats and attacks on your business
DNS configuration analysis
Recovering statistics on the sending of emails
Production of sythetic reports
Identification de menaces de type usurpation d’indentité
Identification of configuration errors
Analysis of all the company’s network flows
Threat and attack detection via AI
and behavioral analysis
.
Automated response to block attacks
Backups of streams for investigation,
ability to replay an attack
.

Compliance

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
In-depth audit of the company’s maturity
Detailed report with areas for improvement
Analysis carried out according to 6 axes: Legal, Technological, HR, GDPR, Social Engineering and Governance
Passive vulnerability detectiońs
Additional product option
Additional product option
Analysis of external or internal IP of the company
Additional product option
Additional product option
ISO27001, OWASP, HIPPA certification
Additional product option
Additional product option
Detailed list of vulnerabilities with
proposed remediations
Additional product option
Additional product option

Social engineering

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
Password vault
Monitoring the Dark Web
Automatically generate and fill in
strong passwords
.
Secure storage of an unlimited number
of passwords and secrets
.
Secure file storage and DLP –
e.g., files and metadata
.
Monitoring and enforcement of security policies
Role-based access + Transfer
and revocation of permissions
.
Access provisioning in any architecture
Integrates with Identity Stack – e.g., Azure AD, LDAP, SSO.
Administration console with
reports, audits and analysis
.
Virtual coaching via chatbot
Cyber awareness and training
State-approved certification (PIX)
Physical workshop with cyber experts

Infrastructure protection

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
Indexing of file, email and AD servers
Analysis of the rights on files or email boxes
Detection of incorrect rights
Detection of sensitive or
regulated data
.
Customizable alerts to detect attacks
Automated correction of access rights
Customizable reports
Analysis of the AD (active directory) configuration
Analysis of the DA’s compliance
with good practice
.
Remedial suggestions
Detection of DA vulnerabilities
Backup of files and disk images
Continuous data protection
Flexible storage
Antimalware scanning of backups
Secure restoration

Communication protection

Cyber Essential Cyber Advanced Cyber Enterprise Secret Protection
Certified end-to-end encryption
by ANSSI, without backdoor
Integration with Outlook for
transparent use
Certification ANSSI CSPN
SDK (software development kit) et API
(application programming interface)
available to integrate Seald
other applications
Encrypted calls, messages or video
Available in the Cloud or On-Premise