50 likes | 62 Views
Seceonu2019s aiXDR solution discovers and remediates a comprehensive list of threats, exploits, attacks, suspicious activities, and non-conformance/non-compliance items, including Zero-Day and advanced malware with sophisticated evasive techniques. The Table below is an indicative subset of the exhaustive threat models implemented in the product. Call Us: 1 (978)-923-0040
E N D
Seceon’sComprehensiveCybersecurityPlatform-Seceon +1(978)-923-0040 info@seceon.com Seceon’sComprehensive Cybersecurity Platform by Randy Blasik | Jan 6, 2023 | aiXDR, Cyber Security Company, Cybersecurity Solution, Ransomware Detection,ServiceSecurityProviders|0comments Typeyourtext Seceon’scomprehensiveplatformincludesmorethan15toolslikeai,ml, vulnerability assessment, SIEM, SOAR, UEBA, NBAD, NTA, EDR, TI, but our focus for today is an area that frequently comes up in conversation with customers and partnersalike.
Seceon’sComprehensiveCybersecurityPlatform-Seceon Does your current cybersecurity Solutiondiscover and remediate unwanted bot activities, malware, lateral movements, credential theft, and insider threats both on-prem andacrossthecloud? Seceon’s aiXDR solution discovers and remediates a comprehensive list of threats, exploits,attacks,suspiciousactivities,and non-conformance/non-compliance items,includingZero-Dayandadvancedmalwarewithsophisticatedevasive techniques. TheTablebelow isanindicativesubsetoftheexhaustive threat modelsimplementedintheproduct. ThreatModels Description TrojanHorseActivity SuspiciousTrojanactivitydetectedinthenetwork. Unusual activitybyaninsiderwithvalidcredentials. Thiscouldindicateauserwithmaliciousintentor potentialcompromiseofthatuser’scredentials. Insider Threat/Compromised Credentials An alert to indicate policy violations based on provisioned rules (granular policies like micro- segmentationofnetwork). PolicyViolation Ahostissuspectedtobeinfectedbasedoncorrelation ofallindicatorsofcompromise. SuspiciousInfectedHost A networkofprivatecomputersinfectedwithmalicious softwareandcontrolledasagroupwithouttheowners’ knowledge, e.g.,tosendspamorsynmessages. BotnetDetected SpankattackisaformofDDoSattackwherethe attackerutilizesmulticastaddressesassource SpankAttack
Seceon’sComprehensiveCybersecurityPlatform-Seceon Serverorendpointinfectedwithmalicioussoftware (includingfileless) Malware InfectedHost
Seceon’sComprehensiveCybersecurityPlatform-Seceon ThreatModels Description Aninsiderwhocouldbecausingleakageofbusiness sensitiveinformationincludingprivacyprotecteddata (e.gPII,PHI),advertentlyorinadvertently from ahigh- valueassettoanUSBdrive InsiderThreat(USB) Unusualuseractivityismappedwithentities (databases,servers,applications)accessedand correlatedwithspikeindatatransferredfrom an internalIP/PorttoanotherinternalorexternalIP/Portto arriveatdataexfiltrationaspotentialThreatIndicator DataExfiltration DDoSAmplification AmplificationbasedDDoSattackdetection DDoSTCPSyn TCPSYNbasedDDoSattackdetection. Dangerousmalwarethatcanencrypttheentirediskand holdendpoints/serverhostageinlieuofdemandfor ransom Ransomware DNSTunneling DNSTunneling CompromisedCredentials UserCredentialsaresuspectedtobecompromised Sociallyengineeredemailthatallurestherecipienttoa spuriouswebsitewithmaliciousintent PhishingAttack ZeroDayMalware Malwarewithoutpriordetectionandknownsignature Attemptsbyamalware(wormorbotnet)tomovefrom oneendpoint/servertoanotherwiththeintentof enhancingdamageand/orreachingitstarget (server/application/database/storage) Lateral Movement Command&ControlCenter (C&C) Attempts by amalware to establish communication with itsCommand&ControlCenterthrough variousmeans– Backdoors,DomainGenerationAlgorithms(DGA), Beaconingetc.
Address - 238 Littleton Road Suite #206 Westford, MA 01886 Phone no - +1 (978)-923-0040 Email Id - sales@seceon.com Website - https://www.seceon.com/