Static file analysis using a lightweight prediction model that autonomously
prevents zero-day and APT cyber threats on the devices, without any
connection to the network or internet. Supports many file types, including
executable files, PDF, Office files, archive files and many more.
Real time pre-execution protection
Detects any file before it is accessed or executed on the endpoint. According to the security policy, the D-Client decides to prevent and quarantine the file, or to allow the file.
Simple, fast, and seamless. Light agent with zero impact on the user experience.
Low memory footprint (<100MB), requires less than 1% CPU usage.
Any file type/File less
Zero-days, APTs, File based: any file type
Fileless types: macros (PowerShell, Java etc.), Scripts (dropper, VBscripts etc.), code injections, etc. Dual use.
Non- intrusive technology
Simple customer insertion and deployment.
Identifies files containing embedded macros and determines whether the macro is malicious or benign.
On-device protection- Online/Offline
evaluating threats in real-time without requiring any supplemental analysis nor connectivity to the organization’s network or even to the Internet.
File access control
Can whitelists files based on hash, certificate and/or location, and blacklist files based on hash.
A cloud-based infrastructure for adding reputation based classification of threats and benign files.
Learn more about Deep Instinct’s D-client for Windows Endpoints and Servers