SOlution - fade
Using our own endpoint and network agents, we generate and collect the right security telemetry
Our platform automatically enrich with additional intel, and correlates hundreds of malicious behaviors
Our hunters and forensic analysts perform triage, report the discovered threats/risks and implement a response
Our solution provides a comprehensive visibility into threats that were able to evade other detection controls. We achieve this through real-time hunts that detect known IOCs and malicious behaviors for the early detection of outsider and insider attacks.
We leverage unsupervised Machine Learning algorithms to identify and flag outliers in the behavior of processes, users and devices. This allows the early discovery of stealth threats and other risks in the environment.
Our agents have a very low footprint and zero impact on the devices where it runs. It collects only the required data for each hunt and don't overload the system with unnecessary calculations.
Our solution scales up to thousands of devices. It's very easy to deploy using standard software deployment solutions. It can be fully deployed from hours to few days.
STEP BY STEP
THIS IS HOW
Generates and collects endpoint security telemetry to provide adequate visibility into cyber attacks
Scans in real-time the security data using our large library of hundreds of detection rules mapped to the MITRE ATT&CK framework.
Hunts trough historical data using unsupervised Machine Learning algorithms to discover hidden attack patterns and stealth threats
Automatically enriches every event with additional contextual intelligence information available to our Threat Intelligence platform
Provides a feed of high confidence security events containing rich contextual information and mapping to the MITRE ATT&CK
Provides a regular feed with information of all the new assets and applications discovered in the environment