Demo Area

Fileless Powershell Attack

Deep Instinct prevents a ransomware based on a fileless attack. Deep Instinct predicts, detects and prevents any malicious file or fileless before it is accessed or executed on the endpoint. The solution supports any kind of file-less attack vector, starting from script-based attacks, dual-use tools and code injection techniques.

 

Fileless Powershell Attack

Deep Instinct prevents a ransomware based on a fileless attack. Deep Instinct predicts, detects and prevents any malicious file or fileless before it is accessed or executed on the endpoint. The solution supports any kind of file-less attack vector, starting from script-based attacks, dual-use tools and code injection techniques.

 

APT Office Macro Attack

Deep Instinct prevents an info-stealer attack. In this example, an email sent to an HR employee that includes an attachment of a word doc containing a malicious macro which is actually a data theft attack, that can steal several files from the HR employee computer. Deep Instinct predicts, detects and prevents any malicious file or fileless before it is accessed or executed on the endpoint. The solution supports many file types due to the agnostic implementation of deep learning, including PE, OLE, PDF, Macros, Fonts, Images, Flash and many more.

First Seen Ransomware Attack

Deep Instinct prevents an unknown ransomware attack. In this demonstration, we will showcase how Deep Instinct is able to prevent an attack of an unknown ransomware before any damage happens (pre-execution).

Mobile Ransomware Attack

Deep Instinct prevents a mobile attack. Deep Instinct predicts, detects and prevents zero-day malicious apps from running on the mobile device, with and without a network connection.

Protection Against Banking Trojans

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a file-less macro based attack that seeks to inject banking Trojan malware. This malware will attempt to steal all the passwords saved in the end-user’s browser related to banking websites.

Protection Against a Ransomware Attack

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a ransomware attack.

Protection Against a Dual Use Attack

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a fileless ransomware attack generated by a script and dual-use tool.

Chrome OS Protection From Malicious Apps

See how Deep Instinct’s security solution comes into action once a malicious app has been downloaded on to Chrome OS, alerting the user that not all is well and prompting them to uninstall.

Isolating a Device from a Network
In this video we will demonstrate the ability to isolate a device from a network in the case of malicious activity. Isolating the network gives the security administrator the opportunity to investigate threats and ascertain that no additional harm can be done on an infected device.