Blackpoint's Cloud Response catches what it can see in login logs and cloud events. Petra was built to catch what attackers actually do once they're inside: the inbox rules, the SharePoint exfiltration, the persistence mechanisms. Our behavioral approach means more attacks caught, deeper remediation, and a cleaner forensic story for every incident.
Capability |
|
Blackpoint |
|---|---|---|
Detection | ||
| Detection approach | Behavioral (all M365 activity) | Location (logins & cloud events) |
| Detects known-bad IPs in login logs | ||
| Attacker intent analysis in Exchange & SharePoint | ||
| Detects residential proxies | ||
| Dynamic tuning for per-client VPN usage | ||
| Catches credentials blocked by MFA or Conditional Access | ||
| Manual tuning required | None | Moderate |
| 24/7 US-based SOC | ||
Remediation | ||
| Disables account & revokes sessions | ||
| Removes malicious inbox rules & forwarding | Partial | |
| Reset password in the portal | ||
| Fleet-wide phishing email retraction | ||
| Reverses attacker activity in SharePoint | ||
| Reverses malicious MFA & device registrations | ||
Forensics | ||
| Finds root-cause phishing email | ||
| Shows IP address of attacker sign-in | ||
| Attacker timeline across M365 | ||
| Generates client-ready PDF | ||
Logs & Data Retention | ||
| M365 SIEM included with ITDR | ||
| Log retention & search window | 12 months searchable | |
Reporting & Sales Enablement | ||
| Targeting analytics per client | ||
| Pre-sales incident response report | ||
| Anonymized incident library for sales | ||
Platform Coverage | ||
| M365 | ||
| Google Workspace | ||
Run a free 6-month scan to see how Petra can level up your security team.