Deep Instinct
multi-layer protection

Time to Predict and Prevent
0
MILLISECONDS
By D-Brain
Time to Investigate
0
MILLISECONDS
By Deep Classification
Time to Remediate & Contain
0
MINUTE

Our solution provides full protection, based on a prediction and prevention first approach, followed by detection and response. The solution offers unmatched efficacy against any cyber threat, using the following multiple layers:

PRE-EXECUTION:
PRE-EXECUTION: Prevention
ON-EXECUTION:
ON-EXECUTION: Detection & Response
POST EXECUTION:
POST EXECUTION: Automatic Analysis
PRE-EXECUTION:
PRE-EXECUTION: Prevention
Deep Static Analysis
Deep Static Analysis

Real-time threat prevention using a lightweight prediction model based on deep learning (D-Brain) that autonomously prevents zero-day and APT cyber threats. . The agnostic implementation of deep learning means it can be applied to any file type and currently supports PE, OLE, OOXML, PDF, Macros, RTF, Fonts, Images, Flash, JAR and archive files.

Deep Static Analysis
D-Cloud File Reputation
D-Cloud File Reputation

Additional layer of protection based on file reputation, both for known malicious files and benign files.

D-Cloud File Reputation
Script Control
Script Control

A compliance and policy infrastructure to eliminate the script-based attack surface, including PowerShell, JavaScript, VBScript, Macros, HTML applications, rundll32, and many more.

Script Control
ON-EXECUTION:
ON-EXECUTION: Detection & Response
Deep Behavioral Analysis
Deep Behavioral Analysis

Behavioral analysis capabilities that can detect and stop malicious business logic of malware, including ransomware, remote code injection and known shellcodes.

Deep Behavioral Analysis
POST EXECUTION:
POST EXECUTION: Automatic Analysis
Deep Classification
Deep Classification

Rapid classification of malware (known & unknown) in real-time, with no human involvement, into seven different malware types, using our unique deep learning malware classification module.

Deep Classification
Remediation
Remediation

Quarantine files, restore files remotely, delete files remotely, terminate running process, isolate device network – all to mitigate and operate existing threats identified in the environment.

Remediation

Learn a bit more. Watch the video

Deep Instinct demo multi-layer protection against a dual use attack
Deep Instinct demo multi-layer protection against a banking trojan
Deep Instinct demo multi-layer protection against a Ransomware attack

Resources