What We Offer

The SKOUT platform protects small businesses by giving their IT providers the tools and expertise they need to deliver world-class cybersecurity services. Our product suite is built on top of the SKOUT AI analytics platform to detect new and advanced threats.

SKOUT Email Protection

SKOUT Email Protection is a cloud-based email security product that blocks spam and phishing attacks. Our solution catches malicious emails by utilizing computer vision, AI and machine learning. Driven, curious, mobile, and growing smarter by the subject line, SKOUT Email Protection adds an important layer of protection to your inbox.

email4

SKOUT Endpoint Protection

SKOUT Endpoint Protection is an integrated threat prevention solution that utilizes our own streaming-data analytics platform. The product combines the power of AI to block malware infections with additional security controls that safeguard against script-based, fileless, memory, and external device-based attacks and is backed by our Security Operations Center.

endpoint4

Network Security Monitoring

SKOUT Network Security Monitoring is managed security product that provides network intrusion detection with a physical or virtual appliance. Suspected threats are correlated for AI enabled analysis using SKOUT’s analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Center. Detect potential threat activity on your network like command and control connections, denial of service attacks, data exfiltration, ransomware, and lateral malware infections.

network3

Log Security Monitoring

SKOUT Log Security Monitoring is a managed security product that collects, aggregates, and normalizes log data from hundreds of sources for AI enabled analysis using SKOUT’s analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Center. Identify threat like behavior in your systems such as impossible logins, multi-factor bypass, coordinated attacks, and rogue agents.

log4

Office 365 Security Monitoring

SKOUT Office 365 Monitoring is a managed security product that collects, aggregates, and normalizes log data from Office 365 tenants using SKOUT’s analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Center. Identify threat like behavior in O365 like unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins, mass file downloads, and brute force attacks.

Artboard 4

Key Features

Email Protection

  • User Friendly Banners
  • Protect and Train
  • Link Sanitation
  • AI and Computer Vision
  • Fully Managed

Endpoint Protection

  • AI-Based
  • Automated Blocking
  • Zero-Day Protection
  • Fileless Attack Prevention
  • Fully Managed

Log Security Monitoring

  • Hundreds of Integrations
  • SIEM Analysis and Analytics Engine
  • Mullti-Tenancy Dashboard
  • 24x7 SOC Analysis
  • Fully Managed

Network Security Monitoring

  • Net-Gen IDS
  • SIEM Analysis
  • Detects Malware
  • 24x7 SOC Analysis
  • Fully Managed

Integrations

  • Cloud Applications

    Cloud Applications

     

    Okta Authentication Monitoring

    Barracuda SKOUT Managed XDR now empowers your partners to detect any suspicious attempts to brute-force log into administrator accounts or bypass your MSP’s Okta instances.

    _____________________________________________

     

    Office 365 Authentication Monitoring

    We’ve expanded SKOUT Office 365 Security Monitoring’s capabilities to improve our Authentication Monitoring for your clients’ O365 environments. Use this integration to detect suspicious logins or indicators that an administrator account is compromised.

    _____________________________________________

     

    Cisco Duo Authentication Monitoring

    Barracuda SKOUT Managed XDR’s Duo integration lets MSPs detect brute force login attempts and to detect logins from suspicious locations, giving them the visibility they need into their Duo installations.

    _____________________________________________

     

    Azure Monitoring

    SKOUT Azure Security Monitoring is a managed, cloud-native security product that detects malware, credential dumping, connections to malicious IP addresses and other breaches.

    _____________________________________________

     

    AWS CloudTrail

    Our XDR Platform now allows Partners to audit and monitor the Amazon Web Services and accounts that they’re responsible for managing.

    _____________________________________________

     

    Cisco FireAMP Cloud

    This integration empowers Barracuda MSP Partners to monitor alerts across your Cisco AMP endpoints for Malware, Trojan and Ransomware attacks.

    _____________________________________________

     

    Cisco Umbrella

    Barracuda SKOUT Managed XDR offers an all-in-one cloud network security integration with Cisco Umbrella. You’ll be able to monitor Umbrella logs and get extended visibility into your remote endpoints.

    _____________________________________________

     

    Google Workspace

    Our latest integration empowers SKOUT Partners to monitor data from your Google Workspace, including attempts to bypass Multi-Factor Authentication, privilege escalation, or changes in administrator roles.

     

  • End Point Security Software (EDR)

    End Point Security Software (EDR)

     

    Crowdstrike

    Use this to get SKOUT setup with Crowdstrike Falcon Monitoring

    _____________________________________________

     

    Cylance Protect Endpoint Protection

    Endpoint Protection service to block potential threats.

    _____________________________________________

     

    ESET NOD32 Anti-Virus

    Endpoint Protection system to block potential threats. Give SKOUT insight into your endpoint logs for analysis and alerting on potential threats and suspicious activity.

    _____________________________________________

     

    Palo Alto Traps Endpoint Security Manager

    Bring SKOUT insight into your endpoint protection log for analysis and alerting.

    _____________________________________________

    SentinelOne

    Bring SKOUT insight into your SentinelOne endpoint log for analysis and alerting.

    _____________________________________________

     

    Sophos Central

    Bring SKOUT insight into your Sophos endpoint protection logs for analysis and alerting.

    _____________________________________________

     

    Symantec Endpoint Protection

    Bring SKOUT insight into your endpoint protection logs for analysis and alerting.

    _____________________________________________

     

    Tanium Connect

    Bring SKOUT insight into your Tanium endpoint log for analysis and alerting

    _____________________________________________

     

    Trend Micro OfficeScan

    Bring SKOUT insight into your Trend Micro endpoint log for analysis and alerting.

    _____________________________________________

     

    Trend Micro Worry Free

    Use to get SKOUT set up with Trend Micro Worry Free.

  • Firewalls

    Firewalls

     

    Sophos XG

    Bring SKOUT insight into your Sophos Firewall protection logs for analysis and alerting

    _____________________________________________

     

    Check Point FireWall-1

    Collect and analyze Check Point Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Cisco Adaptive Security Appliance (ASA)

    Collect and analyze Cisco ASA logs to better identify threats and intrusions across ASA devices.

     

    _____________________________________________

     

    Dell SonicWALL Firewall

    Collect and analyze SonicWALL Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Fortinet FortiGate Firewall

    Collect and analyze FortiGate Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Juniper Networks SSG Firewall

    Collect and analyze Juniper Networks Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Palo Alto Firewall

    Collect and analyze Palo Alto Networks Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Sophos UTM

    Unified Threat Management service to block instrusions across the network. Collect and analyze Alt Networks Sophos UTM logs to better identify threats and intrusions.

    _____________________________________________

     

    WatchGuard Firebox Firewall

    Collect and analyze Firebox Firewall logs to better identify threats and intrusions.

    _____________________________________________

     

    Cisco Meraki

    Analyze Cisco WLAN network security data for any possible instrusions and suspicious activity.

  • Load Balancers/Application Firewalls

    Load Balancers/Application Firewalls

     

    Citrix Netscaler Application Delivery Controller (ADC)

    Analyze Application load balancing services for potential suspicious activity and to give SKOUT better insight.

    _____________________________________________

     

    F5 BIG-IP

    Analyze Application load balancing services for potential suspicious activity and to give SKOUT better insight.

  • Servers

    Servers

     

    Linux Server

    Monitor your server for any potential threats and intrusions.

    _____________________________________________

     

    Microsoft Windows Server

    Monitor your server for any potential threats and intrusions.

  • Ticketing

    Ticketing

     

    ServiceNow

    Use to get SKOUT setup with ServiceNow

    _____________________________________________

     

    Autotask

    Use to get SKOUT setup with Autotask

    _____________________________________________

     

    ConnectWise

    Use to get SKOUT setup with Connectwise