| # | Feature Name | Protect | Defend | Fortify |
|---|---|---|---|---|
| 1 | Advanced Threat Control (ATC) | ✓ | ✓ | ✓ |
| 2 | Web & Email Threat Protection | ✓ | ✓ | ✓ |
| 3 | Application & Device Control | ✓ | × | ✓ |
| 4 | Network Attack Defense | ✓ | ✓ | ✓ |
| 5 | Endpoint Risk Analytics | ✓ | × | ✓ |
| 6 | Cloud Backup (SaaS-Based) | ✓ | ✓ | ✓ |
| 7 | TrueDelta™ Incremental Backup | ✓ | × | ✓ |
| 8 | AES-256 Encryption | ✓ | ✓ | ✓ |
| 9 | Backup Retention Duration | 90d | 1y | 2y+ |
| 10 | Microsoft 365 Backup | Optional | ✓ | ✓ |
| 11 | Managed Detection & Response (MDR) | Optional | × | ✓ |
| 12 | Regional Data Centers | ✓ | ✓ | ✓ |
| 13 | Compliance Reporting (HIPAA/SOC 2) | ✓ | ✓ | ✓ |
| 14 | Incident Visualization & Root Cause Analysis | ✓ | ✓ | ✓ |
| 15 | Threat Hunting | × | ✓ | ✓ |
| 16 | Automated Containment | × | ✓ | ✓ |
| 17 | EDR Data Retention (90–180 Days) | × | ✓ | ✓ |
| 18 | Ransomware-Proof Backups | ✓ | ✓ | ✓ |
| 19 | LocalSpeedVault (Hybrid Restore) | × | Optional | ✓ |
| 20 | Cloud-to-Cloud Recovery (M365) | ✓ | ✓ | ✓ |
| 21 | Centralized Backup Monitoring | ✓ | ✓ | ✓ |
| 22 | Incident & Compliance Reports | × | ✓ | ✓ |
| 23 | XDR for Identity | × | ✓ | ✓ |
| 24 | XDR for Productivity | × | ✓ | ✓ |
| 25 | XDR for Network | × | ✓ | ✓ |
| 26 | XDR for Cloud | × | × | ✓ |
| 27 | Behavior-Based Hardening (PHASR) | × | × | ✓ |
| 28 | External Attack Surface Management (EASM) | × | ✓ | ✓ |
| 29 | Standby Image & vDR | × | ✓ | ✓ |
| 30 | Automated Recovery Testing | × | ✓ | ✓ |
| 31 | Compliance Manager (Mapping) | ✓ | ✓ | ✓ |
| 32 | Executive Dashboards & Reporting | × | ✓ | ✓ |
| 33 | Continuous Risk Analytics | × | ✓ | ✓ |
| 34 | Proactive Threat Intelligence | × | × | ✓ |
Headquarters
10301 Placer Lane
Sacramento, CA. 95827
40th Floor PBCom Tower, 6795 Ayala Avenue corner V.A. Rufino St., Brgy. Bel-Air, Makati City, 1226 NCR, Philippines
Stay informed with the latest cybersecurity insights and technology updates.