Deep Instinct supports the MITRE ATT&CK Framework. Individual events identified by Deep Instinct are mapped to MITRE ATT&CK identifiers. This aids SecOps in understanding an attack and helps threat hunters look for other signs of attack and intrusion.
Deep Instinct’s security management console provides full visibility of any device and OS in a single, all-in-one platform.
Strong BI features demonstrate correlations between events. This reduces the effort required for investigations.
Can be deployed both on-premise or in the cloud.
Classify into seven different malware types using our autonomous cyber security, malware classification module.
Apply Root Cause Analysis (RCA) to describe the process chain that led to the event.
Perform advanced analysis on threats found within the organization. This includes static automated threat analysis, sandboxing analysis, screenshots and network dump of the threats.
Our advanced threat intelligence platform provides in-depth reports with findings, insights, statistics, highlights and assessments on the latest threats found in the network. Also provides a malware analytics for each malicious campaign identified.