- Known pattern/hash lists (traditional antivirus and anti-malware)
- Behavioral monitoring of process execution
- Machine learning to identify anomalous or nontraditional applications or documents
ControlScan’s capabilities direct to the agent include:
- Process blocking and blacklisting
- Malicious file identification and removal
- Containment of device from all network resources
- Security Operations Center Analysts connect into device to clean up and remove any malicious files not automatically removed
- Triage with internal or third party support teams in the event of hands-on requirements or system re imaging requirements
Controlscan’s solution is not software-only licensing. It is not just a software deployment. It is a 24x7x365 managed solution that not only provides detection and immediate response to any threats, but also handles the ongoing policy updates, modifications, and software updates required for the agents.
Remember: you have an average of three minutes before a single breached endpoint begins lateral movement to infect other systems. The standard rule is 1-10-60.
- Detection within one minute
- Investigation completion within ten minutes
- Removal of the threat within 60 minutes
Contact me today to learn more.
No comments:
Post a Comment