
X-SIC
Avoid excuses in the future, take precautions…
A NEW FORM OF DEFENSE
“It is not a question of when!
It’s how the attack will be executed!”
Despite the constant risk they face, most organizations are still using traditional security products – antivirus, firewalls, IDS/IPS, and SIEM systems – that are not the best solution for combating highly sophisticated and complex threats such as those now being exposed, which use more advanced techniques, mainly exploiting social engineering attacks. These tools need more focused resources to protect against this threat. Information sharing, analysis, and detection of attacks are required for a timely response.
THE SOLUTION
Combine multi-vector attack detection with automated investigation, in-depth analysis, and appropriate and rapid response in a platform that is pre-integrated into the security infrastructure to monitor the organization’s sensitive information, generate real-time alerts, and automatically detect vulnerabilities.
Focuses on the complete security of the enterprise, looking not only at devices and protection solutions such as firewalls, IDS, and SIEM but also at user and information security, identifying vulnerable targets within the organization, be they users, misconfigured devices, or vulnerabilities found in equipment/software. It continuously scans the organization, generates alerts, anticipates threats, and notifies when something unusual is detected.
REAL-TIME, GRAPHICAL ANALYTICS PLATFORM
FOR BUSINESS USERS AND DATA ANALYSTS
Network monitoring
– Firewall integration;
– Listing of all services and open ports;
– Vulnerabilities and exploits
vulnerabilities (exploits);
– Identification and alerting of patterns (identification of services such as peers, mining, tor, active trojans).
People monitoring
– Track and analyze people in open information sources;
– CRM for profile management and monitoring;
– Identification of risk patterns and vulnerable users;
– Monitor and test people in the organization with simulated attacks;
– Identify vulnerable accounts.
Devices
– Configure and operate devices;
– Configure the agent that helps protect the devices;
– Monitoring devices with alerts and patterns;
– Logging and auditing devices.
Alerts and reports
– Notification of detected patterns/alerts;
– Generating and viewing reports.
Use advanced machine learning algorithms for model recognition and neural network (NN and ANN) construction.
Leverage CNN with GPU for image recognition, normalization, time series prediction, natural language processing, and video analytics.
Leverage data lakes to store all structured and unstructured data at any volume. The solution is ready for scripting.
Leverage BIG Data, data analytics, and BI to create personalized dashboards quickly.
REFERENCES




