Deep Instinct is revolutionizing cybersecurity with its unique Deep learning Software – harnessing the power of deep learning architecture and yielding unprecedented prediction models, designed to face next generation cyber threats.

Deep Instinct
multi-layer protection

Time to Predict and Prevent
0
MILLISECONDS
By D-Brain
Time to Investigate
0
MILLISECONDS
By Deep Classification
Time to Remediate & Contain
0
MINUTE

Our solution provides full protection, based on a prediction and prevention first approach, followed by detection and response. The solution offers unmatched efficacy against any cyber threat, using the following multiple layers:

PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
ON-EXECUTION:
ON-EXECUTION: Detection & Automatic Response
POST EXECUTION:
POST EXECUTION: Automatic Analysis & Remediation
PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
Deep Static Analysis

Deep Static Analysis

D-Client predicts and prevents any malicious file upon the file’s initial access on the device, and can also perform a full file scan during the initial installation or on-demand. It can be configured to prevent or detect malicious files, using different thresholds adapted to the organization’s needs.

 

 

Deep Static Analysis
D-Cloud File Reputation

D-Cloud File Reputation

Additional layer of endpoint protection based on file reputation, both for known malicious and benign files.

D-Cloud File Reputation
Script Control

Script Control

A compliance and policy infrastructure to eliminate the script-based attack surface, including PowerShell, JavaScript, VBScript, Macros, HTML applications, rundll32, and many more

Script Control
Blacklisting

Blacklisting

Files can be blacklisted based on hashes, based on IoCs, and based on import IoC lists.

Blacklisting
ON-EXECUTION:
ON-EXECUTION: Detection & Automatic Response
Deep Behavioral Analysis

Deep Behavioral Analysis

Behavioral analysis capabilities that can detect and stop malicious business logic of malware, including ransomware, remote code injection and known payloads for system endpoint protection.

Deep Behavioral Analysis
POST EXECUTION:
POST EXECUTION: Automatic Analysis & Remediation
Deep Classification

Deep Classification

Rapid classification of malware (known & unknown) in real-time, with no human involvement, into seven different malware types, using our unique deep learning malware classification module for endpoint security.

Attack Chain: Root Cause Analysis to describe the process chain that led to the event.

Advanced Threat Analysis: A set of tools that perform advanced analysis on threats found within the organization. This includes static analysis, sandboxing analysis, screenshots and network dump of the threats.

Deep Classification
Remediation

Remediation

Quarantine filesQuarantine malicious files during their prevention.

Whitelist: Whitelist files detected falsely as malicious based on hash, certificate and/or path. The ability to import a list of IoCs based on hashes is also available. 

Delete files remotely: Detected files that were not prevented and quarantined can be deleted remotely from the endpoint.

Terminate running process: Files that were detected as malicious and processes that were detected behaving maliciously can be terminated remotely.

Isolate device from network: Devices that pose a risk to the organization can be isolated remotely.

Remediation

Learn a bit more. Watch the video

Deep Instinct demo multi-layer protection against a dual use attack
Deep Instinct demo multi-layer protection against a banking trojan
Deep Instinct demo multi-layer protection against a Ransomware attack

Resources