“Provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.
The innovative security solutions offer broad protection against diverse modes of attack, including:
-Executables – Trojans, malware, worms, backdoors, payload-based Fileless-Memory-only malware, no-disk-based indicators
-Fileless – Memory-only malware, no-disk-based indicators
-Documents – Exploits rooted in Office documents, Adobe files, macros, spear phishing emails
-Scripts – Powershell, WMI, PowerSploit, VBS
-Credentials – Mimikatz, credentials scraping, tokens”