Our solution provides full protection, based on a prediction and prevention first approach, followed by detection and response. The solution offers unmatched efficacy against any cyber threat, using the following multiple layers:
Our endpoint security solution uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. The agnostic implementation of deep learning can be applied to any file type and currently supports: PE, OLE, OOXML, PDF, RTF, Fonts, Images, Flash and JAR.
D-Client, the endpoint security module, predicts and prevents any malicious file upon the file’s initial access on the device, and can also perform a full file scan during the initial installation or on-demand. The endpoint protection software can be configured to prevent or detect malicious files, using different thresholds adapted to the organization’s needs.
An additional layer of endpoint protection based on file reputation, both for known malicious and benign files.
Behavioral analysis capabilities that can detect and stop malicious business logic of malware, including ransomware, remote code injection and known shellcodes for system endpoint protection.
Rapid classification of malware (known & unknown) in real-time, with no human involvement, into seven different malware types, using our unique deep learning malware classification module for endpoint security.
Root Cause Analysis to describe the process chain that led to the event.
Advanced Threat Analysis
A set of tools that perform advanced analysis on threats found within the organization. This includes static analysis, sandboxing analysis, screenshots and network dump of the threats.
Quarantine files, restore files remotely, delete files remotely, terminate running process, isolate the endpoint from the network – all to mitigate and operate existing threats identified in the environment.
Provides the ability to whitelist files based on hash, certificate and/or path, and to blacklist files based on hash. The ability to import a list of IoCs based on hashes is also available.