Includes Log-based Intrusion Detection, Rootkit Detection, Malware Detection, Active Response, Compliance Auditing, File Integrity Monitoring, System Inventory.
Note: If you have a paid license for an Atomic product, you do not need to sign up for this. All of these features are already included in those products, and more.