Deep Instinct
multi-layer protection

Time to Predict and Prevent
0
MILLISECONDS
By D-Brain
Time to Investigate
0
MILLISECONDS
By Deep Classification
Time to Remediate & Contain
0
MINUTE

Our solution provides full protection, based on a prediction and prevention first approach, followed by detection and response. The solution offers unmatched efficacy against any cyber threat, using the following multiple layers:

PRE-EXECUTION:
PRE-EXECUTION: Prevention
ON-EXECUTION:
ON-EXECUTION: Detection & Response
POST EXECUTION:
POST EXECUTION: Automatic Analysis
PRE-EXECUTION:
PRE-EXECUTION: Prevention
Deep Static Analysis
Deep Static Analysis

Our endpoint security solution uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. The agnostic implementation of deep learning can be applied to any file type and currently supports: PE, OLE, OOXML, PDF, RTF, Fonts, Images, Flash and JAR.

D-Client, the endpoint security module, predicts and prevents any malicious file upon the file’s initial access on the device, and can also perform a full file scan during the initial installation or on-demand. The endpoint protection software can be configured to prevent or detect malicious files, using different thresholds adapted to the organization’s needs.

Deep Static Analysis
D-Cloud File Reputation
D-Cloud File Reputation

An additional layer of endpoint protection based on file reputation, both for known malicious and benign files.

D-Cloud File Reputation
Script Control
Script Control

As a next generation cyber security solution there is a compliance and policy infrastructure to eliminate the script based attack surface. This includes PowerShell, JavaScript, VBScript, Macros, HTML applications, rundll32, and many more.

Script Control
ON-EXECUTION:
ON-EXECUTION: Detection & Response
Deep Behavioral Analysis
Deep Behavioral Analysis

Behavioral analysis capabilities that can detect and stop malicious business logic of malware, including ransomware, remote code injection and known shellcodes for system endpoint protection.

Deep Behavioral Analysis
POST EXECUTION:
POST EXECUTION: Automatic Analysis
Automatic Analysis
Automatic Analysis

Deep Classification
Rapid classification of malware (known & unknown) in real-time, with no human involvement, into seven different malware types, using our unique deep learning malware classification module for endpoint security.

Attack Chain
Root Cause Analysis to describe the process chain that led to the event.

Advanced Threat Analysis
A set of tools that perform advanced analysis on threats found within the organization. This includes static analysis, sandboxing analysis, screenshots and network dump of the threats.

Automatic Analysis
Response
Response

Remediation
Quarantine files, restore files remotely, delete files remotely, terminate running process, isolate the endpoint from the network – all to mitigate and operate existing threats identified in the environment.

Whitelist/Blacklist
Provides the ability to whitelist files based on hash, certificate and/or path, and to blacklist files based on hash. The ability to import a list of IoCs based on hashes is also available.

Response

Learn a bit more. Watch the video

Deep Instinct demo multi-layer protection against a dual use attack
Deep Instinct demo multi-layer protection against a banking trojan
Deep Instinct demo multi-layer protection against a Ransomware attack

Resources