Skip to content

Service Tiers

Service Tiers

KYRA AI MDR offers three service tiers designed to meet the security needs of organizations from SMB to Enterprise.

Tier Overview

TierTarget MarketKey Value Proposition
DetectSMB (50-200 employees)24/7 threat detection with automated alerts
RespondMid-market (200-1,000)Detection + incident response + containment
HuntEnterprise (1,000+)Full MDR + proactive threat hunting + custom playbooks

Service Capabilities

CapabilityDetectRespondHunt
24/7 Threat DetectionYesYesYes
MITRE ATT&CK MappingYesYesYes
Automated Alert TriageYesYesYes
AI-Powered AnalysisBasicAdvancedPremium + Custom
Incident ResponseAlert Documentation OnlyYesYes + On-site
Threat ContainmentNoYesYes + Advanced Automation
Proactive Threat HuntingNoNoYes
Custom Detection RulesNoLimited (10 rules)Unlimited
Executive ReportingBasic DashboardYesYes + Custom
Compliance TemplatesNoSOC 2, ISO 27001All frameworks + Custom
Dedicated TAMNoNoYes
On-site Incident ResponseNoNoYes (within 24h)
Threat IntelligenceBasic IOCsPremium FeedsCustom + Private CTI
API AccessRead-onlyLimited WriteFull API Access

Ingestion Quotas

TierSustained EPSBurst EPS (15min)Grace Period
Detect500 EPS1,000 EPS30 minutes
Respond2,500 EPS5,000 EPS1 hour
Hunt15,000 EPS25,000 EPS4 hours

Overage pricing: Detect $0.15/1K events, Respond $0.10/1K events, Hunt $0.05/1K events.


SIEM Query Limits

TierMax Date RangeMax Rows/QueryConcurrent QueriesExport Limit
Detect7 days10,000350 MB
Respond90 days100,000101 GB
Hunt2 years5,000,0005050 GB

Report Quotas

TierExecutive ReportsCompliance ReportsCustom ReportsScheduled Reports
Detect4/monthNoNoNo
Respond12/month6/monthNo4/month
HuntUnlimitedUnlimited20/monthUnlimited

Data Retention

TierAlert RetentionRaw Log RetentionSIEM IndexAnalyticsInvestigation Data
Detect90 days30 days30 days1 year90 days
Respond1 year6 months1 year3 years2 years
Hunt5 years2 years5 years7 years7 years

Legal hold override: All retention periods extended indefinitely during active legal proceedings.


Incident Severity Matrix (SEV1-SEV4)

SEV1 — Critical (Active Compromise with Business Impact)

Indicators: Active ransomware, real-time data exfiltration (>1GB), domain admin compromise, critical infrastructure breach, public data exposure, active C2 communication.

Business Impact: Service disruption >50% of users, financial loss >$100K, regulatory breach requiring immediate notification.

Response: Detection to acknowledgment <15 minutes (all tiers), war room activation immediate, executive notification within 30 minutes, customer notification within 1 hour.

SEV2 — High (Confirmed Compromise, Limited Immediate Impact)

Indicators: Confirmed malware execution, lateral movement, non-privileged credential compromise, successful privilege escalation, persistent backdoor deployment.

Response Times:

  • Detect: Acknowledged within 4 hours, contained within 8 hours
  • Respond: Acknowledged within 1 hour, contained within 8 hours
  • Hunt: Acknowledged within 30 minutes, contained within 4 hours

SEV3 — Medium (Suspicious Activity Requiring Investigation)

Indicators: Policy violations, authentication anomalies, network reconnaissance, suspicious downloads, phishing attempts, unsuccessful exploitation.

Response Times:

  • Detect: Documented analysis within 24 hours
  • Respond: Investigation within 4 hours
  • Hunt: Investigation within 2 hours

SEV4 — Low (Informational/Routine)

Indicators: Routine vulnerability scan findings, expected security tool alerts, minor configuration drift, certificate expiration warnings.

Response Times:

  • Detect: Analysis within 72 hours
  • Respond: Batch processing within 24 hours
  • Hunt: Analysis within 8 hours

Severity Escalation Rules

EscalationTrigger
SEV4 → SEV3>5 related events from same asset within 24 hours
SEV3 → SEV2IOC match confirmed or successful exploitation evidence
SEV2 → SEV1Lateral movement detected or business-critical system affected
Any → SEV1Customer declares business impact or regulatory trigger

SLA Response Times

SeverityDetectRespondHunt
SEV115 min15 min15 min
SEV24 hours1 hour30 min
SEV324 hours4 hours2 hours
SEV472 hours24 hours8 hours

SLA Resolution Times

SeverityDetectRespondHunt
SEV18 hours*4 hours2 hours
SEV216 hours*8 hours4 hours
SEV33 days*24 hours12 hours
SEV45 days*3 days2 days

Detect tier resolution = comprehensive analysis and recommendations (no active containment)

Containment SLAs (Respond and Hunt Only)

SeverityRespondHunt
SEV12 hours1 hour
SEV26 hours3 hours
SEV312 hours6 hours
SEV424 hours12 hours

Platform Availability

ComponentDetectRespondHunt
Event Ingestion99.5%99.9%99.99%
Management Console99.0%99.5%99.9%
REST API99.0%99.5%99.9%
Alert Notifications99.5%99.9%99.99%

SLA Credits

Availability BreachCreditMax Monthly
Below Hunt SLA (99.99%)5%25%
Below Respond SLA (99.9%)10%50%
Below Detect SLA (99.5%)10%50%
Below 99.0% (any tier)25%100%

Feature Access by Tier

CategoryFeatureDetectRespondHunt
DetectionBasic Rule LibraryYesYesYes
DetectionAdvanced ML ModelsNoYesYes
DetectionCustom Rule BuilderNoLimitedYes
DetectionThreat Intel FeedsBasicPremiumPremium + Private
InvestigationAutomated TriageYesYesYes
InvestigationForensics ToolsNoBasicAdvanced
InvestigationCase ManagementBasicYesYes
ResponseAlert NotificationsYesYesYes
ResponseAutomated ContainmentNoYesYes
ResponsePlaybook ExecutionTemplatesYesYes
ReportingStandard DashboardsYesYesYes
ReportingExecutive ReportsLimitedYesYes
ReportingCompliance ReportsNoYesYes
ReportingCustom ReportsNoNoYes
APIRead-only APIYesYesYes
APIWrite APINoLimitedYes
APIWebhooksNoYesYes

Tier Migration

Customers can upgrade or downgrade their service tier at any time:

  • Upgrades: New features and quotas are activated immediately
  • Downgrades: Features are adjusted at the end of the current billing period
  • Data Retention: On downgrade, existing data remains accessible until the original retention period expires; new data follows the new tier’s retention schedule