|100 GB per day||₹9,253.48 per day||50%
|200 GB per day||₹16,656.26 per day||55%||Order Now|
|300 GB per day||₹24,059.04 per day||57%||Order Now|
|400 GB per day||₹30,844.48 per day||58%||Order Now|
|500 GB per day||₹37,013.90 per day||60%||Order Now|
|More than 500 GB per day||₹37,013.90 per day + ₹7,402.78 per day (for each 100 GB increment after 500 GB in daily capacity)||60%||Order Now|
1. If the amount of data ingested into Azure Sentinel exceeds your selected daily capacity reservation then additional data is charged at Pay-As-You-Go rates listed below.
2. When compared to Pay as you go model
With Pay-As-You-Go pricing, you are billed per gigabyte (GB) for the volume of data ingested for analysis in Azure Sentinel and stored in the Azure Monitor Log Analytics workspace. Prices shown below are related to the security analytics enabled by Azure Sentinel. Prices shown below are related to the analytics enabled by Azure Sentinel and do not include the related data ingestion charges for Log Analytics. Please refer to the Azure Monitor Log Analytics pricing for the related data ingestion charges.
Charges for Azure Sentinel will go into effect on 1st November 2019.
|Azure Sentinel||₹185.07 per GB-ingested||Order Now|
On-boarding of Data Sources
Threat Hunting Templates
Tier 3 and 4 Investigation
Tuning and Optimization
Collect Data at cloud scale—across all users, devices, applications and infrastructure, both on-premises and in multiple clouds
Detect previously uncovered threats and minimise false positives using analytics and unparalleled threat intelligence from Microsoft
Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft
Respond to incidents rapidly with built-in orchestration and automation of common tasks
See and stop threats before they cause harm, with SIEM reinvented for a modern world. Azure Sentinel is your birds-eye view across the enterprise.
Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI).
Eliminate security infrastructure setup and maintenance and elastically scale to meet your security
needs—while reducing IT costs.
Invest in security, not infrastructure setup and maintenance with first cloud-native SIEM from a major cloud provider. Never again let a storage limit or a query limit prevent you from protecting your enterprise. Start using Azure Sentinel immediately, automatically scale to meet your organisational needs and only pay for the resources you need.
Focus on finding real threats quickly. Reduce noise from legitimate events with built-in machine learning and knowledge based on analysing trillions of signals daily. Accelerate proactive threat hunting with pre-built queries based on years of security experience. View a prioritised list of alerts, get correlated analysis of thousands of security events within seconds and visualise the entire scope of every attack. Simplify security operations and speed up threat response with integrated automation and orchestration of common tasks and workflows.
Connect with data from your Microsoft products in just a few clicks, import Office 365 data for free and analyse and draw correlations to deepen your intelligence.
Connect to and collect data from all your sources including users, applications, servers and devices running on-premises or in any cloud. Integrate with existing tools, whether business applications, other security products or homegrown tools and use your own machine-learning models. Optimise for your needs by bringing your own insights, tailored detections, machine learning models and threat intelligence.
The Azure Sentinel application is built on Azure infrastructure, allowing high-scale, flexible security while reducing security infrastructure setup and maintenance. Together with the functionality of Azure Log Analytics, this enables rapid connection to data sources, pre-built functionality, visibility to multi-cloud and hybrid environments and powerful analytics.
Deployment and management of a SIEM can be complicated and time-consuming for any organization. XcellHost’s experience helps fast track Sentinel deployment and provides expert-level resources to assist you with detection, investigation and response to threats.
Yes. Managed Sentinel can help your organization with the initial build of the Azure Sentinel SIEM, configure the log sources to feed into Azure Log Analytics and with related migration tasks. Your existing SIEM use cases can be ported into Azure Sentinel and Managed Sentinel can provide the expertise.
An Azure Sentinel SIEM deployment is usually completed within 2-3 weeks. Our customers typically start with a Proof of Concept (PoC) deployment, analyze the results and then initiate a full solution deployment.
Yes, Azure Sentinel has a data connector for AWS CloudTrail Log, which will allows log collection from the AWS platform directly into Azure Log Analytics. Azure Sentinel has a built-in parser for AWS traffic, so the on boarding is relatively simple. Managed Sentinel team can assist with the integration process.
Azure Sentinel provides a built-in Office 365 connector. The following article describes how Office 365 can be configured to generate the relevant logging data. Azure Sentinel provides an Office 365 dashboard where you can see some relevant info related to Office 3
The volume of data moving to Cloud and the Internet bandwidth consumption on the customer premises varies based on number of events collected, the size and type of events, and time of day. Each customer is different, and it will be difficult to estimate the traffic without additional details.
Managed Sentinel consultants can work with your team to understand the environment (network topology, current technologies, and current security challenges), decide on what log sources are relevant for SIEM analysis, and construct the proper parsers to extract the essential information to be sent to Azure Sentinel. We let our customers know the size, complexity and costs before we do start the work. The initial phase of the project, information gathering, and high-level design is essential to each SIEM deployment.
Yes, Azure Sentinel has built-in SOAR capabilities achieved via the integration with Azure Logic Apps. Currently there are hundreds of connectors available in Azure Logic Apps which can be integrated within the Azure Sentinel Playbook.
By default, in Azure Sentinel you get 3 free months of online log retention. If your company needs more, you must pay more. But, maximum Data Retention in days that Log Analytics can offer is 720 days (2 years).
We had few customers with longer data retention needs, based on various compliance regulations. In this situation the recommendation is to extract the logs from Log Analytics and stored them in Azure Storage Blob. This is a more cost–effective option, especially if customer does not need to analyze real-time.
In Performance Cloud hosting is done on a virtual server, using a server virtualization technology. It partitions a computer virtually into multiple servers. Each user gets much more privacy and security as compared to the shared hosting i.e. you get the advantages of dedicated hosting but at considerably lower prices.
In the case Windows PCS hosting, you can use Remote Desktop and in the case of Linux PCS hosting, you can use SSH (Secure Shell Access) to work on the PCS servers remotely.
Yes, you get dedicated IPs with your PCS account. With your own dedicated IP address, you can run your own web, e-mail and FTP servers.
Shared hosting is a type of web hosting where a single physical server hosts multiple sites. Many users utilize the resources on a single server, which keeps the costs low. Users each get a section of a server in which they can host their website files.
The cloud built for Machine Learning. Super powerful GPU-backed VMs in the cloud. The easiest way to get started with Machine Learning, Artificial Intelligence
Accelerate your machine learning and deep learning workloads with Tesla V100 and Nvidia T4 based GPU instances.