Reference materials, frameworks, and downloadable assets shared with Cyvatar customers and partners.
Frameworks, operating models, and reference guides used across Cyvatar engagements. More resources will be added over time.
Roles & responsibilities framework showing who is Responsible, Accountable, Consulted, and Informed across every Cyvatar-managed security function — from vulnerability scanning to incident response.
Download RACI (PDF)How a top-3 U.S. debt relief company turned 800+ unknown vulnerabilities into 100% asset visibility and fully automated threat response — and why their CTO now cites cybersecurity as a growth enabler.
Download Case Study (PDF)How an early-stage identity-security SaaS team passed SOC 2 Type 2 with no in-house security headcount — pen test, TVM, and patch automation in one subscription, BYOD environment included.
Download Case Study (PDF)How a Wisconsin/Iowa community bank replaced its MSSP with Cyvatar Secure Endpoint Management on 29 endpoints — lower cost, no onsite appliances to babysit, and a banker-friendly support team.
Download Case Study (PDF)Personal devices in the workplace create invisible attack surfaces. This article breaks down the real risks of Bring Your Own Device policies and what to do about them.
Read ArticleOne-page deep-dives for each of Cyvatar's 14 canonical solutions. Each exhibit covers scope, deploy requirements, success state, FAQs, and the RACI for who owns what. Live HTML view + downloadable PDF for SOW attachments.
Continuous vulnerability scanning, patching, and remediation across your fleet. NinjaOne + Tenable + Vonahi, managed end-to-end.
Endpoint & Vulnerability Download PDFSentinelOne EDR + Red Canary 24×7 SOC. Behavioral AI on every device, human analysts watching the alerts.
Endpoint & Vulnerability Download PDFTenable WAS for customer-facing web apps + API endpoints. Cyvatar manages scope, schedule, and remediation guidance.
Endpoint & Vulnerability Download PDFStandalone Tenable VM scanning when you want visibility but not full TVM service. Reports delivered; remediation is yours.
Endpoint & Vulnerability Download PDFDetection + response for account takeover, token theft, impossible-travel. Red Canary user account telemetry across Workspace / M365 / Okta / Entra.
User & Access Download PDFPhishing-resistant MFA + SSO for every employee. Duo (most common) or Okta — deployed and operated by Cyvatar.
User & Access Download PDFCloudflare Area1 hybrid inline + API protection across M365 and Workspace. Cyvatar reviews escalated phishing, BEC, and malicious-attachment detections.
Email & DNS Download PDFDNS-layer threat blocking + content policy via DNS Filter. Cyvatar manages policy, tuning, and review.
Email & DNS Download PDFCurricula's story-driven training platform — annual modules, compliance attestations, onboarding paths. The foundation tier.
Awareness Download PDFCurricula HRP add-on. Identifies high-risk users from behavior + simulation results, routes them into targeted remediation paths.
Awareness Download PDFMonthly phishing campaigns + remedial training for clickers, without bundled annual SAT modules. Curricula-powered.
Awareness Download PDFRed Canary Cloud detection across AWS / Azure / GCP control planes. 24×7 SOC monitoring of cloud-native threat patterns.
Cloud / Network / Data Download PDFFirewall log ingestion + Red Canary lateral-movement detection. Per-device coverage on network gear. Requires SEM.
Cloud / Network / Data Download PDFRed Canary Security Data Lake — long-term log retention + queryable forensic evidence on demand.
Cloud / Network / Data Download PDF