SCOPE OF THREAT PROTECTION
|Network, user and endpoint bases attacks||Endpoint attacks only|
SCOPE OF RESPONSE CAPABILITIES
|Cross environment automation and orchestration||Endpoint related remediations only|
|Native part of Cynet 360 core offering||Standalone services that entail additional payment|
SentinelOne is a traditional endpoint solution that focuses on file/ process-based threats: malware, exploits, fileless, Macros etc., and typically gain good results on that field. However, it lacks the ability to identify and block attacks that manifests only in anomalous network traffic (lateral movement, data exfiltration and network-based credential theft) or user behavior (anomalous login of compromised user account).
Cynet 360 uses Cynet Sensor Fusion™ technology to continuously collect and analyze endpoint, user and network activities within the protected environment, powering the ability to identify and block both file\process-based attacks, as well network and user based ones, rendering complete coverage beyond the capabilities of SentinelOne.
Advanced cyberattacks target all parts of the environment: endpoints, files, process, user accounts and network traffic.
Unlike SentinelOne that has a limited number of endpoints/file remediations (isolate, kill process and delete/quarantine file), Cynet 360 uses Cynet Sensor Fusion™ technology to provide a complete set of remediation tools for infected endpoints, malicious files/ processes, compromised user accounts and attacker-controlled traffic.
Moreover, Cynet 360 can act as a response orchestration interface that communicates with core components such as Firewalls and Active Directory to expand the response process across the entire environment.
Cynet 360 supports the use of preset and user-created created remediation playbooks that automate response for detected threats by chaining together several discreet remediation actions (for example, isolate the endpoint + disable user account in Active Directory as an automated response user account compromise detection).
These playbooks both scale the security team alert-handling capacity by automating repetitive tasks and radically increase the share of attacks that are autonomously addressed and resolved by Cynet 360 without need of human intervention.
Cynet’s CyOps team operates a 24/7 SOC, providing customers with full MDR services with no additional payment over Cynet 360 core offering. CyOps continuously monitors, trains and optimizes Cynet 360 detection algorithms based on over 30 threat intelligence feeds and detected attacks.
CyOps provides Cynet customers with the additional services:
Continuous monitoring of all entities and activities in the environment is enables users to discover exposed attack surfaces and address them (vulnerable systems and apps, unchanged user passwords, etc.), and by that eliminate the risk of up to 60% of common attack vectors.
Cynet 360 uses Cynet Sensor Fusion™ technology to automate the collection and correlation of executed file/processes, user account activities, file access and network traffic, introducing unmatched speed and ease to all monitoring and control workflows.
PREVENTION & DETECTION
Multilayered Malware Protection
|ML Based Static Analysis|
|Dynamic Analysis (Sandbox)|
Compromised User Account Detection
|Anomalous User Logins|
|Preset User Activity Rules|
Malicious Network Traffic
|Credential Theft (LLNMR\NBT-NS Attacks)|
|Tunneling Based Data Exfiltration|
|Lateral Movement (Pass The Hash Etc.)|
|Reconnaissance (Scanning Attacks)|
|Decoys ( Data Files, Credentials,Network Shares, URL, RDP)|
|Host remediation:||Isolate,Restart,Change IP,Delete\Disable Service, Delete\Disable Scheduled Task,Run Command, RunScript||Isolate,Run Command Run Script|
|User remediation:||Disable\Enable, Reset Password|
|Network remediation:||Block Traffic, Clear DNS Cache|
|Expand Remediation Across the Environment Infrastructure: Firewall, Proxy, AD, etc.|
|Chain Various Remediation Actions to a Single Flow That Runs Automatically When a Predefined Alert Is Triggered|
MANAGED DETECTION & RESPONSE SERVICES
|Managed Detection & Response Services||Requires additional payment|
Let our team monitor and detect cybersecurity threats against your network, users, files and hosts 24/7 via our ThreatFortress Cynet360 XDR and Response Automation platform.
ThreatFortress Cynet XDR prevents and detects threats on endpoints, networks, and users and triggers for each identified threat an automated investigation flow that reveals the attack’s scope and root cause and applies automated remediation. The 24×7 MDR team continuously monitor and optimize this process to maintain top quality and precisionLearn more
Lure Attackers to Reveal Their Presence with Advanced Deception Technology. That's right part of the ThreatFortress system sets traps for cybercriminals to further protect your system against attack.Learn More
Schedule a time to speak to your cybersecurity consultant for free to help you understand your options. Or Email Help@ChatFortress.com and our team will respond to your questions.
Helping to protect your business with real-time threat prevention and detection services for your Users, Hosts, Networks and Files. XDR Prevention and detection of a myriad of attack vectors, utilizing the capabilities of the following security technologies:
Cynet Prevention & Detection leverages Cynet Sensor Fusion to provide the integrated capabilities of Next-Generation Antivirus, Endpoint Detection and Response, Network Analytics, Deception and User Behavioral Analytics. Cynet also moves beyond the incremental value of these capabilities, by unveiling advanced threats that can be detected only by concurrent analysis of endpoint, user and network activities.
Block execution of malware, exploits, fileless, Macros and ransomware.
Detect advanced attacks by continuous monitoring of endpoint file and process activities.
Monitor network traffic to unveil reconnaissance, credential theft, lateral movement and data exfiltration attempts.
Profile the behavior of all user accounts to pinpoint anomalies that indicate an attempted compromise. Learn More
Plant various types of decoy files across your environment to lure attackers into revealing their presence. Learn More
Providing fully automated or manual response actions to threats. Manual and automated remediations of infected hosts, malicious files, compromised user accounts and attacker-controlled traffic.
Cynet Response Orchestration includes a full set of remediation actions to address infected hosts, malicious files, attacker-controlled network traffic and compromised user accounts. Remediation can be performed either directly on the endpoint or by involving infrastructure components such as firewall, AD, etc. Cynet supports response automation by gathering several remediation actions into playbooks that are activated upon occurrence of respective alerts.
Remove malicious presence and activity with pre-built actions for hosts, files, users and network.
Build your own response workflows by chaining various remediations together and adding scripts to communicate with core components such as firewalls and AD.
Automate incident response workflows by using Cynet’s playbooks to resolve security events without the need for human intervention.
Providing you with 24/7 monitoring of all of your endpoints by real humans and SOC Anlysts. CyOps is Cynet’s 24/7 SOC team of threat researchers and security analysts that complement Cynet 360 technology with unmatched security expertise, available to Cynet’s customers at no additional charge. CyOps assist Cynet customers with in-depth investigation, proactive threat hunting, malware analysis and attack reports, ensuring that every security event is handled and resolved.
Continuous search through our customers’ environment to detect and address live attacks.
Engage CyOps upon any suspicious activity you see in your environment, to detect, respond and remediate.
Get reports on attacks that CyOps detects across our customers’ install-base, including IOC and mitigation practices.
Submit any suspicious file to an expert analysis for information regarding its nature and potential risks.