1 / 5

Seceon’s Comprehensive Cybersecurity Platform - Seceon

Seceonu2019s aiXDR solution discovers and remediates a comprehensive list of threats, exploits, attacks, suspicious activities, and non-conformance/non-compliance items, including Zero-Day and advanced malware with sophisticated evasive techniques. The Table below is an indicative subset of the exhaustive threat models implemented in the product. Call Us: 1 (978)-923-0040

Download Presentation

Seceon’s Comprehensive Cybersecurity Platform - Seceon

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Seceon’sComprehensiveCybersecurityPlatform-Seceon +1(978)-923-0040 info@seceon.com Seceon’sComprehensive Cybersecurity Platform by Randy Blasik | Jan 6, 2023 | aiXDR, Cyber Security Company, Cybersecurity Solution, Ransomware Detection,ServiceSecurityProviders|0comments Typeyourtext Seceon’scomprehensiveplatformincludesmorethan15toolslikeai,ml, vulnerability assessment, SIEM, SOAR, UEBA, NBAD, NTA, EDR, TI, but our focus for today is an area that frequently comes up in conversation with customers and partnersalike. 

  2. Seceon’sComprehensiveCybersecurityPlatform-Seceon Does your current cybersecurity Solutiondiscover and remediate unwanted bot activities, malware, lateral movements, credential theft, and insider threats both on-prem andacrossthecloud? Seceon’s aiXDR solution discovers and remediates a comprehensive list of threats, exploits,attacks,suspiciousactivities,and non-conformance/non-compliance items,includingZero-Dayandadvancedmalwarewithsophisticatedevasive techniques. TheTablebelow isanindicativesubsetoftheexhaustive threat modelsimplementedintheproduct. ThreatModels Description TrojanHorseActivity SuspiciousTrojanactivitydetectedinthenetwork. Unusual activitybyaninsiderwithvalidcredentials. Thiscouldindicateauserwithmaliciousintentor potentialcompromiseofthatuser’scredentials. Insider Threat/Compromised Credentials An alert to indicate policy violations based on provisioned rules (granular policies like micro- segmentationofnetwork). PolicyViolation Ahostissuspectedtobeinfectedbasedoncorrelation ofallindicatorsofcompromise. SuspiciousInfectedHost A networkofprivatecomputersinfectedwithmalicious softwareandcontrolledasagroupwithouttheowners’ knowledge, e.g.,tosendspamorsynmessages. BotnetDetected SpankattackisaformofDDoSattackwherethe attackerutilizesmulticastaddressesassource SpankAttack

  3. Seceon’sComprehensiveCybersecurityPlatform-Seceon Serverorendpointinfectedwithmalicioussoftware (includingfileless) Malware InfectedHost

  4. Seceon’sComprehensiveCybersecurityPlatform-Seceon ThreatModels Description Aninsiderwhocouldbecausingleakageofbusiness sensitiveinformationincludingprivacyprotecteddata (e.gPII,PHI),advertentlyorinadvertently from ahigh- valueassettoanUSBdrive InsiderThreat(USB) Unusualuseractivityismappedwithentities (databases,servers,applications)accessedand correlatedwithspikeindatatransferredfrom an internalIP/PorttoanotherinternalorexternalIP/Portto arriveatdataexfiltrationaspotentialThreatIndicator DataExfiltration DDoSAmplification AmplificationbasedDDoSattackdetection DDoSTCPSyn TCPSYNbasedDDoSattackdetection. Dangerousmalwarethatcanencrypttheentirediskand holdendpoints/serverhostageinlieuofdemandfor ransom Ransomware DNSTunneling DNSTunneling CompromisedCredentials UserCredentialsaresuspectedtobecompromised Sociallyengineeredemailthatallurestherecipienttoa spuriouswebsitewithmaliciousintent PhishingAttack ZeroDayMalware Malwarewithoutpriordetectionandknownsignature Attemptsbyamalware(wormorbotnet)tomovefrom oneendpoint/servertoanotherwiththeintentof enhancingdamageand/orreachingitstarget (server/application/database/storage) Lateral Movement Command&ControlCenter (C&C) Attempts by amalware to establish communication with itsCommand&ControlCenterthrough variousmeans– Backdoors,DomainGenerationAlgorithms(DGA), Beaconingetc.

  5. Address - 238 Littleton Road Suite #206 Westford, MA 01886 Phone no - +1 (978)-923-0040 Email Id - sales@seceon.com Website - https://www.seceon.com/

More Related