📖 You Are Already a Target book coming soon. Join waitlist
Private · Customers & Partners

Cyvatar Resources

Reference materials, frameworks, and downloadable assets shared with Cyvatar customers and partners.

Resource Library

Downloads & References

Frameworks, operating models, and reference guides used across Cyvatar engagements. More resources will be added over time.

Framework

Cyvatar RACI Matrix

Roles & responsibilities framework showing who is Responsible, Accountable, Consulted, and Informed across every Cyvatar-managed security function — from vulnerability scanning to incident response.

PDF Updated Feb 2025
Download RACI (PDF)
Case Study

Americor: Worry-Free Cybersecurity for Financial Services

How a top-3 U.S. debt relief company turned 800+ unknown vulnerabilities into 100% asset visibility and fully automated threat response — and why their CTO now cites cybersecurity as a growth enabler.

PDF Financial Services 3-min read
Download Case Study (PDF)
Case Study

Verosint: Startup-Friendly Path to a Clean SOC 2 Type 2

How an early-stage identity-security SaaS team passed SOC 2 Type 2 with no in-house security headcount — pen test, TVM, and patch automation in one subscription, BYOD environment included.

PDF SaaS / Identity 3-min read
Download Case Study (PDF)
Case Study

Peoples State Bank: Replacing the MSSP, Cutting Cost

How a Wisconsin/Iowa community bank replaced its MSSP with Cyvatar Secure Endpoint Management on 29 endpoints — lower cost, no onsite appliances to babysit, and a banker-friendly support team.

PDF Community Banking 3-min read
Download Case Study (PDF)
Blog

Why BYOD Is a Risk Your Business Can't Afford

Personal devices in the workplace create invisible attack surfaces. This article breaks down the real risks of Bring Your Own Device policies and what to do about them.

Article Cyvatar Blog
Read Article
Solution Exhibits

Cyvatar Solutions — Datasheets & Exhibits

One-page deep-dives for each of Cyvatar's 14 canonical solutions. Each exhibit covers scope, deploy requirements, success state, FAQs, and the RACI for who owns what. Live HTML view + downloadable PDF for SOW attachments.

🛡

TVM · Threat & Vulnerability Management

Continuous vulnerability scanning, patching, and remediation across your fleet. NinjaOne + Tenable + Vonahi, managed end-to-end.

Endpoint & Vulnerability Download PDF
🛡

SEM · Secure Endpoint Management

SentinelOne EDR + Red Canary 24×7 SOC. Behavioral AI on every device, human analysts watching the alerts.

Endpoint & Vulnerability Download PDF
🛡

TVM-W · Web App Scanning

Tenable WAS for customer-facing web apps + API endpoints. Cyvatar manages scope, schedule, and remediation guidance.

Endpoint & Vulnerability Download PDF
🛡

TVM-C · TVM Custom — Scanning Only

Standalone Tenable VM scanning when you want visibility but not full TVM service. Reports delivered; remediation is yours.

Endpoint & Vulnerability Download PDF
🪪

UAM · User Account Monitoring

Detection + response for account takeover, token theft, impossible-travel. Red Canary user account telemetry across Workspace / M365 / Okta / Entra.

User & Access Download PDF
🪪

MFA · Multi-Factor Authentication

Phishing-resistant MFA + SSO for every employee. Duo (most common) or Okta — deployed and operated by Cyvatar.

User & Access Download PDF

ESM · Email Security Management

Cloudflare Area1 hybrid inline + API protection across M365 and Workspace. Cyvatar reviews escalated phishing, BEC, and malicious-attachment detections.

Email & DNS Download PDF

DSM · DNS Security Management

DNS-layer threat blocking + content policy via DNS Filter. Cyvatar manages policy, tuning, and review.

Email & DNS Download PDF
🎓

SAT-F · Security Awareness Foundation

Curricula's story-driven training platform — annual modules, compliance attestations, onboarding paths. The foundation tier.

Awareness Download PDF
🎓

SAT-HRP · Human Risk Protection

Curricula HRP add-on. Identifies high-risk users from behavior + simulation results, routes them into targeted remediation paths.

Awareness Download PDF
🎓

SAT-P · Phishing Simulation Only

Monthly phishing campaigns + remedial training for clickers, without bundled annual SAT modules. Curricula-powered.

Awareness Download PDF

CSM · Cloud Security Monitoring

Red Canary Cloud detection across AWS / Azure / GCP control planes. 24×7 SOC monitoring of cloud-native threat patterns.

Cloud / Network / Data Download PDF

NSM · 24/7 Network Monitoring

Firewall log ingestion + Red Canary lateral-movement detection. Per-device coverage on network gear. Requires SEM.

Cloud / Network / Data Download PDF

SDL · Security Data Lake

Red Canary Security Data Lake — long-term log retention + queryable forensic evidence on demand.

Cloud / Network / Data Download PDF