Description
“Provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.
The innovative security solutions offer broad protection against diverse modes of attack, including:
Malware
-Executables – Trojans, malware, worms, backdoors, payload-based Fileless-Memory-only malware, no-disk-based indicators
-Fileless – Memory-only malware, no-disk-based indicators
Exploits
-Documents – Exploits rooted in Office documents, Adobe files, macros, spear phishing emails
-Browser – Drive-by downloads, Flash, Java, Javascript, VBS, IFrame/HTML5, plug-ins
Live/Insider
-Scripts – Powershell, WMI, PowerSploit, VBS
-Credentials – Mimikatz, credentials scraping, tokens”
Reviews
There are no reviews yet.