Upload
marco-martinez
View
28
Download
0
Embed Size (px)
Citation preview
Next Generation APT Defense
Correlated VisibilityComplete View correlating Web,
Email and Lateral spread
with Lateral Movement
Virtualized DeploymentEasy to Deploy on premise or
cloud, Easy to Integrate via APIs
Dynamic Detection Machine Learning plusBehavioral Inspection
We find evasive threatsthat cause breaches
by using our unique combination of behavioral analysis and machine learning.
Best Enterprise Security Solution
Why Cyphort?
We empower your incidentresponse team
by prioritizing alerts, eliminating overloads and thereby significantly reducing response time.
A Leader in theForrester Wave™
Automated Malware Analysis Report
Endpoints
Web
Deception
NetworkBehavior Email
Need Complete & Correlated Visibility
Cyphort Core
LateralCollector
DatabaseCollector
WebCollector
EmailCollector
EndpointIntegrations
CASBIntegrations
Cyphort Collectors
API based integration with Security Controls
Mitigation & Enforcement
Publish Blocking DataTo Existing: FW, IPS and SWG
API based or manual
Infection Verification
Verify infection on suspect endpoints before cleaning
(Native, Carbon-Black, Tanium, Crowdstrike)
So Your IR Team Can Take Action
Manoj Leelanivas President and CEO
Dr. Fengmin GongCo-Founder & Chief Architect/CSO
Frank JasChief Architect
Steve MorganChief Financial Officer
Gururaj SinghVP of Engineering
Paul McNultyVP of Support & Operations $55M
2015 Rookie
Security Company
2016 Best Enterprise Security Solution
TOP 20 Coolest
SIEM and Threat
Detection Vendors
2014
HOTTEST SECURITY
STARTUPS OF 2015
Cyphort FireEye Others
Visibility
Detection
Containment
Flexibility &Scalability
Distributed software model
Multi-platform, Multi-OS
Anti-sandbox evasionCorrelation across
vectorsBusiness risk
Security ecosystem integration
Incident response automation
Rigid hardware architecture
Dedicated appliance per OS/App
No integrationPeople and
professional services heavy IR
Scale-out architecture covering E/W and N/S
Licensed for scale
Cannot detect evasion
Alert fatigue
No correlation or insight
Appliances only
Limited North/South coverage only
Limited scale
Limited integrationNo incident response
automation
No business risk context
No evasion or data theft detection
Rigid hardware or software modelsLimited platform
coverage (e.g. No Mac OSX etc.)
Limited North /South Coverage only
Correlated Visibility
Centrally manage alerts with visibility across both lateral and perimeter
Convenient application threat awareness with combined Web and Email
Seamless threat visibility correlated across Microsoft, Apple and Android devices
Dynamic Detection
Find next gen threats with combined Machine Learning and Behavioral Inspection
Reduce false positives and alert overload with contextual risk ranking
Detection that evolves as threats do with Adaptive Anti-Evasion Technology
© Copyright 2016 Cyphort, Inc. All rights reserved. Proprietary & Confidential
Virtualized Deployment
Quick and easy deployment across global sites – on premise or cloud
Prevent threat spread with ecosystem integration and open API
Deployment flexibility with open API integration for custom IT orchestration and workflow needs