FREE: Not available. PRO: Available. What it does: Throttles abusive authentication requests. How to use it properly: Enable during login abuse.
FREE: Not available. PRO: Available. What it does: Notifies admins of lockouts. How to use it properly: Investigate repeated alerts.
FREE: Not available. PRO: Available. What it does: Displays a chronological attack timeline. How to use it properly: Use to identify entry points.
FREE: Not available. PRO: Available. What it does: Alerts when malware is detected. How to use it properly: Treat as urgent.
FREE: Not available. PRO: Available. What it does: Runs automated scans. How to use it properly: Schedule off-peak.
