Discover

investigate

respond

shutterstock_1197153475_edited.jpg
IS YOUR COMPANY UNDER A CYBER ATTACK?
Call us at our central number or send us a message using our contact form. We can help you!

FALCON DETECTION ENGINE

INTRODUCING our
SOlution - fade

Collect

Using our own endpoint and network agents, we generate and collect the right security telemetry

Analyze

FADE automatically correlates and reports hundreds of indicators of behaviors for our hunters

Report

Our hunters report accurate alerts that clearly indicate the presence of an adversary in the environment or a serious risk

Full
Visibility

Our solution provides a comprehensive visibility into threats that were able to evade all other detection controls. We achieve this through real-time hunts and historical Machine Learning hunts for the early detection of outsider and insider attacks.

Reveal
Hidden

We leverage unsupervised Machine Learning algorithms to identify and flag outliers in the behavior of processes, users and devices. This allows the early discovery of stealth threats and other risks in the environment.

Low
Footprint

Our agents have a very low footprint and zero impact on the devices where it runs. It collects only the required data for each hunt and don't overload the system with unnecessary calculations.

Highly
Scalable

Our solution scales up to thousands of devices. It's very easy to deploy using standard software deployment solutions. It can be fully deployed from hours to few days.

Bez názvu-1.jpg

STEP BY STEP

THIS IS HOW

IT WORKS

Vektorovýinteligentníobjekt_81cae523-6

Generates and collects endpoint security telemetry to provide adequate visibility into cyber attacks

Vektorovýinteligentníobjekt_1a5bc04c-6

Scans in real-time the security data using our large library of more than 150 detection rules mapped to the MITRE ATT&CK framework.

Vektorovýinteligentníobjekt_c81d20b5-5

Hunts trough historical data using supervised and unsupervised Machine Learning algorithms to discover hidden attack patterns and stealth threats

3.png

Automatically enriches every event with additional contextual intelligence information available to our Threat Intelligence platform

Vektorovýinteligentníobjekt_f985558f-7

Provides a feed of high confidence security events containing rich contextual information and mapping to the MITRE ATT&CK

Vektorovýinteligentníobjekt_d64b4d50-7

Provides a regular feed with information of all the new assets and applications discovered in your environment