Managed Service or Private Cloud.

Both include Incident Response and Proactive Support. Both are available through AWS and Azure Marketplace. The only difference is who operates the infrastructure.

Deployment models

Choose how Elastio runs.

The only difference is where the Hunt Engine runs.

Managed serviceCUSTOMER ACCOUNTCustomer datasecureELASTIO ACCOUNTHunt EngineCISO / SecOpsPrivate cloudCUSTOMER ACCOUNTCustomer datasecureCUSTOMER ACCOUNTHunt EngineCISO / SecOps

“Elastio runs the infrastructure. You get the outcomes.”

“Full control over connectors and clusters.”

Both modelsInclude Incident Response, Proactive Support, and the full Hunt Engine capability set. Available on AWS and Azure Marketplace.

Side-by-Side

Deployment comparison

Elastio ManagedPrivate Cloud
Infrastructure operationElastio manages all cloud connectors and scanning clustersCustomer manages cloud connectors and scanning clusters
Compute and scanning costsIncluded in subscription priceCustomer is responsible for compute and scanning costs
Incident Response ServiceIncludedIncluded
Proactive SupportIncludedIncluded
Marketplace procurementAvailable on AWS and Azure MarketplaceAvailable on AWS and Azure Marketplace
Data residencyData is shared with the managed service account for scanningAll data remains in customer's cloud account

Procurement

Available on Cloud Marketplaces

Both deployment models are available through AWS Marketplace, Azure Marketplace, and the IBM Cloud Catalog. Procure through your existing cloud commitment and count spend toward your EDP, MACC, or applicable IBM agreements.

AWS

AWS Marketplace

Purchase through your existing AWS commitment. Counts toward your AWS EDP.

Azure

Azure Marketplace

Purchase through your existing Microsoft Azure commitment. Counts toward your MACC.

IBM

IBM Cloud Catalog

Deploy Advanced Ransomware Protection for IBM Cloud Object Storage from the IBM Cloud Catalog.

Included in Both Deployment Models

Services included with every license.

Incident Response Service

Managed by Elastio's security team. Continuously monitors your environment for active threats and provides expert guidance during ransomware incidents. Included in both deployment models.

Key Features

CapabilityDescription
Threat MonitoringReal-time monitoring of threats detected within your Elastio tenant. The security team evaluates detections and suspicious activity, reducing noise and focusing attention on high-risk events.
Expert GuidanceWhen threats are identified, Elastio's security team provides analysis and recommended response actions — containment steps, recovery recommendations, and forensic guidance scaled to the severity of the event.
SIEM IntegrationAll threats detected by Elastio are automatically forwarded to your SIEM, ensuring your security team maintains complete visibility and can correlate Elastio threat data with other security signals.
Collaborative EscalationIn the event of a confirmed or suspected ransomware incident, Elastio's Incident Response team engages directly with your team to align on next steps and assist with clean recovery operations.

Service Excellence

CapabilityDescription
Dedicated security teamExperts in ransomware detection and recovery, available to guide you during critical incidents.
Seamless integrationElastio threat intelligence integrates into your existing security operations, strengthening overall resilience.
Provable recovery alignmentIncident Response services are aligned with Elastio's core capability: ensuring you always have a clean, provable recovery point.
SLA24-hour response time guaranteed. The team typically responds within a few hours. Incidents are forwarded to any SIEM or alert rules configured in your console.

Proactive Support

A dedicated Elastio service team continuously monitors your tenant to resolve or triage issues before they require customer involvement. Included in all licenses.

Key Features

CapabilityDescription
Proactive MonitoringContinuous monitoring of your Elastio deployment to detect and mitigate issues before they escalate. Currently, 98% of identified issues are resolved without customer involvement.
Issue ResolutionAutomatic escalation of critical issues including ransomware detections, failed hunts, backup failures, and suspected tenant account security breaches. Where further diagnosis is required, the support team contacts you directly.
Actionable ReportingRegular reports summarising issues, resolutions, and recommendations to improve resilience and operational efficiency.
Customer EscalationDirect communication with your team when necessary, ensuring full transparency and alignment on next steps.

Service Excellence

CapabilityDescription
Dedicated support teamA team fully committed to your success, familiar with your environment and its specific needs.
Defined SLA24-hour response time commitment.
SLA24-hour response time commitment.
PROVE YOUR RECOVERY

Ready to see your last known
clean point?

Book a Recovery Assessment
orRequest a Demo
Services | Elastio