BlueVoyant Service Description
Subject to the terms and conditions of the Order Form and the BlueVoyant Managed Security Services Master Services Agreement, BlueVoyant will provide the services set forth in an Order Form and further described in links below to Client, at the service levels set forth below each Service Description. Capitalized terms used herein but not defined shall have the meanings ascribed to such terms in the Master Services Agreement.
Detection & Response
MXDR for Microsoft
- MDR - Microsoft Sentinel
- MDR - Microsoft 365 Defender
- MDR - Microsoft Defender for Endpoint
- MDR - Microsoft ATD - Advanced Threat Detection
- MDR - Microsoft Sentinel Plus XDR / MXDR
- MDR - Microsoft Sentinel Plus XDR / MXDR - With Scan and Protect (DRP)
- MDR - Microsoft Sentinel Plus XDR / MXDR - With VISIBL - Enterprise
- MDR - Microsoft Sentinel Plus XDR / MXDR - With VISIBL - Standard
- MDR - Microsoft Advanced Log Routing with ADX
- MDR - Microsoft MDR Log Collector
Microsoft Deployment Services
- Deployment - Microsoft Copilot for Security
- Deployment - Microsoft Sentinel - SMC
- Deployment - Microsoft Sentinel - Enterprise
- Deployment - Microsoft 365 Defender - SMC
- Deployment - Microsoft 365 Defender - Enterprise
- Deployment - Microsoft Defender for Cloud
- Deployment - Microsoft Defender for Endpoint
- Deployment - Microsoft Sentinel Plus XDR - SMC
- Deployment - Microsoft Sentinel Plus XDR - Enterprise
- Deployment - Microsoft Sentinel Plus XDR - Premium SMC
- Deployment - Microsoft Sentinel Plus XDR - Premium Enterprise
- Deployment - MDR - Concierge Services - 20hrs
- Microsoft Premium Support Services
MXDR for Splunk
Splunk Deployments
MDR for Endpoint
Supply Chain Defense
Cyber Posture Management
- CIS-Based Security Maturity Engagement
- Cyber Due Diligence
- Cybersecurity Maturity Model Certification
- Cybersecurity Risk Assessment
- Digital Forensics and Incident Response Retainer
- Digital Forensics Services
- Government Cybersecurity Consulting
- Incident Response Plan Development
- MXDR with Consulting
- Posture Self-Assessment Engagement
- Tabletop Exercises
- Third-Party Data Breach Exposure Report
- Virtual Chief Information Security Officer (vCISO)