Advanced Endpoint Security

Deep Instinct’s solution provides full protection based on multiple layers, including a prediction & prevention first approach, followed by detection & response, against known and unknown cyber threats.

This is Prevention, Unlimited.

PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
ON-EXECUTION:
ON-EXECUTION: Detect & Automatically Respond
POST-EXECUTION:
POST-EXECUTION: Automatically Analyze & Remediate
PRE-EXECUTION:
PRE-EXECUTION: Predict & Prevent
Deep Static Analysis

Deep Static Analysis

Uses deep learning, the most advanced AI technology. The Deep Static Analysis provides far greater accuracy than signature and heuristic solutions, and is more accurate than classical machine learning algorithms, which suffer from lower detection rates and higher false positives. The agnostic implementation of deep learning can be applied to any file type and it supports PE, OLE, OOXML, PDF, RTF, Flash, Fonts, Images, Flash and JAR files.

D-Client predicts and prevents any malicious file upon the file’s initial access on the device, and can also perform a full file scan during the initial installation or on-demand. It can be configured to prevent or detect malicious files, using different thresholds adapted to the organization’s needs.

Deep Static Analysis
D-Cloud File Reputation

D-Cloud File Reputation

An additional layer of protection based on file reputation, both for known malicious and benign files.

D-Cloud File Reputation
Script Control

Script Control

A compliance and policy infrastructure to eliminate the script-based attack surface, including PowerShell, JavaScript, VBScript, Macros, HTML applications, rundll32, and many more.

Script Control
Blacklist

Blacklist

Blacklist files based on hashes, based on IoCs, and based on import IoC lists.

Blacklist
ON-EXECUTION:
ON-EXECUTION: Detect & Automatically Respond
Deep Behavioral Analysis

Deep Behavioral Analysis

Behavioral analysis capabilities that can detect and stop malicious business logic of malware, including ransomware, remote code injection and known payloads.

Deep Behavioral Analysis
Ransomware Protection

Ransomware Protection

The encryption techniques and the methods to perform read/write operations to encrypt files, are all known. This module covers them all, with a near 100% detection rate and an industry-low false positive rate. This has been confirmed with over tens of thousands of tests performed by the Deep Instinct research team.

Ransomware Protection
Code Injection Protection

Code Injection Protection

Detects Remote Code Injection techniques used to move laterally between processes.

Code Injection Protection
Known Payloads Protection

Known Payloads Protection

Detects the execution of known payloads during their execution. Protects against shellcodes for many tools, including MSFvenom, Shellter and Veil.

Known Payloads Protection
POST-EXECUTION:
POST-EXECUTION: Automatically Analyze & Remediate
Automatic Analysis

Automatic Analysis

Deep Classification: Rapid classification of malware (known & unknown) in real-time, with no human involvement, into seven different malware types, using our unique deep learning malware classification module.

Attack Chain: Root Cause Analysis to describe the process chain that led to the event.

Advanced Threat Analysis: A set of tools that perform advanced analysis on threats found within the organization. This includes static analysis, sandboxing analysis, screenshots and network dump of the threats.

Automatic Analysis
Remediation

Remediation

Quarantine files: Quarantine malicious files during their prevention.

Whitelist: Whitelist files detected falsely as malicious based on hash, certificate and/or path. The ability to import a list of IoCs based on hashes is also available.

Delete files remotely: Detected files that were not prevented and quarantined can be deleted remotely from the endpoint.

Terminate running process: Files that were detected as malicious and processes that were detected behaving maliciously can be terminated remotely.

Isolate device from network: Devices that pose a risk to the organization can be isolated remotely.

Remediation

Attack Vectors Covered

Spyware

Protects against any type of spyware, including banking trojans, keyloggers and credentials dumpers.

Fileless Malware

Fileless attack vectors are prevented, including script-based attacks, dual-use tools and code injection techniques.

Ransomware

Ransomware is mitigated using a comprehensive protection, by both static and behavioral analysis.

File Based Malware

Executable and non-executable files are scanned to predict and prevent viruses, worms, backdoors, droppers, wipers, coin-miners, known shellcodes, PUA and more.

Learn more about Deep Instinct’s
Server & Endpoint Security Solution
Windows OS Datasheet
Mac OS Datasheet
Chrome OS Datasheet

Learn a bit more. watch the demo