Cynet 360 is a detection and response security platform specifically created for today’s multi-faceted cyber-battlefield. It gives your organization a comprehensive tool for finding unknown, camouflaged threats which have gotten through protection perimeters.
Quickly Finds Unknown Threats
Cynet uses a unique approach to detecting threats, correlating and analyzing indicators across files, users, networks and endpoints. Cynet easily integrates into existing security infrastructure, providing organizations with the rapid and flexible ability to respond – neutralizing the unknown threats, anomalies and unsigned malware which have bypassed existing detection solutions.
Detects and Remediates
The solution establishes a risk ranking, allowing it to accurately detect and remediate sophisticated cyber-attacks, with an emphasis on zero-day attacks and malicious code activity from unsigned threats such as Trojans, ransomware, root kits, viruses and worms.
24/7 Monitoring – front line security intelligence ensures low false positives
Deception – deployment of decoys for users, files and servers.
Use Case: Endpoint Detection & Response
Increased complexity and frequency of advanced attacks elevate the need for enterprise-scale response, wide investigations and a rapid forensic process. Endpoint detection and response (EDR) tools help organizations speedily investigate security incidents and detect malicious activities.
Rapid Deployment, Full Visibility:
The Cynet 360 Advanced Threat Detection and Response platform can be deployed across thousands of endpoints in under 2-hours. The ideal solution for Endpoint Detection and Response applications, the platform provides visibility throughout the organization, to endpoints, servers and the network.
Precise Detection of Threats on the Endpoint:
With continuous monitoring of endpoints for behavioral and interaction indicators, in-memory attacks and suspicious network communications, Cynet takes the unique approach of thinking like an adversary. Cynet sees threat indicators where threat adversaries try to slip in, giving a complete picture of an attack operation and actionable intelligence to detect, deny, and respond before they can do damage.
Threat Hunting & Validation:
Cynet is also used for searching and reviewing historic and current incident data on endpoints, investigating and validating alerts and responding to confirmed threats. The Cynet platform:
Provides the full picture and chain of events of an attack
Enables quick investigation, triage, response and remediation
Reduces dwell-time of threats
Automatic & Manual Remediation:
Because of its access to the endpoint, automatic or manual remediation can be done to stop malicious activity, providing enterprise security teams a powerful yet simple way to detect, disrupt and respond to advanced threats before they can do damage.
4 STEPS TO RISK RANKING
The Cynet security platform correlates and analyzes indicators across all fronts of the organization – networks, files, users and endpoints – to establish risk-ranking and hone in on previously unidentified threats.
Establishment of a Baseline
Cynet begins by collecting and then scanning indicators, assessing organizational traffic to define a baseline. These indicators are then used to establish a risk ranking, showing the severity of behavioral anomalies.
Correlation of Indicators
The risk rankings are established following the correlation of indicators across the 4 layers of protection – files, networks, users and endpoints. The indicators are filtered through Cynet’s correlation engine, which checks for anomalies including network configuration changes; suspicious changes in endpoints between scans; system file modifications; suspicious registry changes and other flag-raising activities. Decoys can also be applied for users, files and servers.
Vetting against Security Intelligence
Potential threats are then vetted against Cynet’s security intelligence module, where they are tested against dozens of anti-virus and anti-malware engines, threat reports and zero-day intelligence files. Threats identified as absolute threats are flagged and alerts issued.
Inspection for Behavior Analysis
Items still appearing suspicious but not yet determined threats are then put through a static and if needed dynamic (sandbox) inspection. Within the sandbox, the file is executed in the context of the original scenario from which the file was found, indicators are collected during and after execution, including binary files and dependencies, such as DLLs. With this information, malicious behavior can be detected, identifying even difficult to uncover threats.
Cynet – the Total Security Platform
Today organizations must protect and detect on multiple fronts – files, networks, endpoints and users. A comprehensive platform, in which each front is investigated as part of the whole – is essential to achieving true organizational security.
Cynet analyzes files for threats that bypass the security perimeter, infiltrating corporate systems and data files. Attackers piggy-back on the vulnerabilities they discover in files, or in the software that is used to create or open a file, using these weaknesses to insert malicious code into the system.
Cynet exposes attacks on the network such as malicious IP addresses and botnets, password-based attacks, modification of network and server configurations, Denial-of-Service attacks and man-in-the-middle and compromised key attacks. Resulting service outages from these threats result in downtime, lost productivity and brand damage.
Cynet tracks user activities to create a baseline of typical user scenarios including working hours, file access, server access and typical network traffic. User behavior is monitored to uncover anomalies which can hint at attacks geared toward Intellectual Property theft, sabotage of IT systems, fraud, espionage or accidental insider threats.
Cynet scans and monitors endpoints for indicators of compromise that circumvent prevention systems. The platform detects and remediates the spread of advanced malware, Ransomware and other signature-less threats on Windows and Linux endpoints, which are often the hidden doors for hackers looking to break into critical systems.