/Capabilities
Endpoint Detection and Response
Alerting tool & endpoints monitoring responding threats in real-time, increasing visibility and transparency of user data
Detecting stored endpoint events and malware injections, creating blacklists and whitelist, and integration with other technologies.
Advanced Threat Protection
Identify suspicious behavior and Advanced Persistent Threats on endpoints in an environment, and alert administrators accordingly.
Collecting and aggregating data from endpoints and other sources be enriched by additional cloud analysis.
Intrusion Prevention & Detection
Network surveilance identifying possible incidents and supicius logging. Stopping threats and reporting to security administrators.
Identifying problems with security policies and deterring individuals (attackers) from violating security policies.
Secure
Web Gateways
Protect Web-surfing from infection and enforce company policies. Filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. Include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications.
Denial-of-Service Protection
Analyze traffic samples “out-of-path”, which allows asynchronously detect DDoS attacks without causing latency or impacting performance. Analyze packet fields, source IP, source port, destination IP, destination port, protocol, TCP flags, sequence number, packet rate and HTTP.
Data
Leak Protection
Native remediation, Comprehensive data discovery, Fingerprinting/OCR, Unified policy enforcement, Single console, Converged network + endpoint + Cloud apps, Behavioral Awareness, Native analytics, Risk-adaptive protection and Risk-based policy enforcement
/Articles
Zero Trust Network (ZTNA) – How to use? Atualize-se sobre Cyber Security
