5
Your defense-in-depth will fail. enSilo prevents the consequences when it does. enSilo focuses on removing an attacker's end goal: the ability to steal, modify or encrypt endpoint & server data. INFILTRATION IS INEVITABLE ISN’T EXFILTRATION

enSilo - Strategy and Solution Summary

Embed Size (px)

Citation preview

Page 1: enSilo - Strategy and Solution Summary

Your defense-in-depth will fail. enSilo prevents the consequences when it does.

enSilo focuses on removing an attacker's end goal: the ability to steal, modify or encrypt endpoint & server data.

INFILTRATION IS INEVITABLE

ISN’TEXFILTRATION

Page 2: enSilo - Strategy and Solution Summary

WE CHANGE THE APPROACH

TURN THE CYBER KILL CHAIN AROUND

Don’t worry about infiltration. While the cyber security market is focused on preventing the infiltration, we believe if you stop the exfiltration or ransoming then you’ve already won. If you

block the data theft or tampering, then you have plenty of time to work backwards. While everyone else is watching the entrance we’re guarding the exit so your data doesn’t leave.

Defense Ends Here

Defense Starts Here

DATA PROTECTION PLATFORM

EndpointProtectionPlatform

EndpointDetection &

Response

enSilo is not your typical endpoint solution that prevents infiltration. We take a new post-infection approach that catches the attackers red-handed to prevent the consequences of attacks.

enSilo is a Data Protection Platform that includes both Endpoint Prevention Platform (EPP) and Endpoint Detection and Response (EDR) capabilities as well as application communication control. All in real-time.

INFILTRATIONLATERAL

MOVEMENTDATA OFINTEREST

ACTIONS ONTARGET

Page 3: enSilo - Strategy and Solution Summary

enSilo protects your data from exfiltration in real time by working at the operating system level. Your data doesn’t leave.

Real-time Exfiltration Prevention

enSilo stops the malicious encryption right before it starts. It works on the operating system level making it the only universal solution.

Real-time Ransomware Prevention

Cyber security should not negatively impact business. Never stop working even on a compromised machine.

Frictionless SecurityenSilo alerts you only after it stops a malicious outbound communication, file tampering or unauthorized encryption process.

One Alert Per Live Threat

“First, stop the exfiltration of data, and then stop the lateral movement of the adversaries. Then, stop the data collection & try to limit the capabilities for them to be able to fool your domain admin.”

The enSilo Collector can be installed on any of the following operating systems (both 32-bit and 64-bit versions):

OS X Versions: Maverick (10.9), Yosemite (10.10) and El Capitan (10.11)

VDI Environments: VMware Horizons 6 and Citrix XenDesktop 7

Windows XP SP2/SP3, 7, 8, 8.1 and 10

Windows Server 2008, 2008 R2, 2012 and 2012 R2

Page 4: enSilo - Strategy and Solution Summary

ABOUT ENSILO

enSilo is a cyber-security company that offers real-time data protection against advanced targeted attacks.

We started enSilo because we recognized that external threat actors can't be stopped by traditional security methods. Instead, we focus on preventing the consequences of a successful attack. Attackers can get in, but they can't steal or modify your data.

By preventing the consequences of active threats in real-time and not having to quarantine infected devices, enSilo allows organizations to

secure their data while minimizing the operational impact of an attack. enSilo’s platform requires no specialized knowledge or configuration of users or data.

The company is headed by security veterans from leading private and public sector companies, including Imperva, Akamai, EMC and Rafael.

enSilo is financially-backed by LightSpeed Venture Partners, Rembrandt Venture Partners and Carmel Ventures.

HOW IT WORKS

STEP 4STEP 3STEP 2STEP 1

An enSilo Collector on the computing device collects OS metadata

Upon connection establishment or file modification request, the Collector sends a snapshot of the request to enSilo Core, enriched with its respective OS metadata

Using enSilo’s technology, the Core analyses OS metadata along with the request and enforces the exfiltration/ ransomware prevention policies

Only legitimate connections or file modifications are allowed

ON CONNECTION ESTABLISHMENT

FILEON FILE MODIFICATION

ENSILO COLLECTOR CONSEQUENCE RELATED ACTIVITIES ENSILO CORE

STOP

STOP

Page 5: enSilo - Strategy and Solution Summary

* Source: Gartner, Inc., Cool Vendors in Digital Workplace Security, 2016, Ayal Tirosh, Lawrence Pingree, Avivah Litan, Lawrence Orans, Adam Hils, Felix Gaehtgens, Brian Reed, Peter Firstbrook. Gartner Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Gartner Cool Vendor Logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved.

“Chief information security officers and other IT security decision makers should consider new vendors of security technologies that support a secure digital workplace.” *

ENSILO HAS BEEN NAMED A 2016 GARTNER COOL VENDOR IN DIGITAL WORKPLACE SECURITY.