120 likes | 236 Vues
As threats evolve rapidly, our defenses often lag, relying on outdated protection methods. We need a shift from static defenses to an active, adaptable approach. By dramatically increasing sensory input and employing machine intelligence, we can transform this data into actionable knowledge, enabling us to identify and counter new threats swiftly. Continuous monitoring and point remediation can ensure effective malware removal, even against sophisticated attacks. Our goal is to provide enterprises with situational awareness and precise actions to combat malware threats in real-time.
E N D
John Prisco President and CEO Triumfant, Inc.
Customer Information Security Concerns • Our defenses are designed to defeat threats we have seen before. We have very little protection against new types of threats. • The time it takes for us to learn about and defend against a new threat is measured in days or weeks. • We are largely unaware of the changes occurring within our computing environment on a day-to-day basis.
Defenses are unable to adequately protect computers The Static Defense Shield Problem
What We Need: An Active, Adaptable Defense Sense Understand Inform Act • Dramatically increase the volume and flow of sensory input • Use machine intelligence to convert sensory input into knowledge • Provide flexible and powerful interfaces optimized for data navigation • Provide the ability to synthesize responses to address new threats on-the-fly
Sense DeepScan Don’t assume, collect everything • Continuously scans over 200,000 attributes • Registry keys - Files • Processes - Services • Open ports - Event Logs • - Performance counters - Security settings • Hardware attributes - Memory tables • 500 sensitive attributes scanned every 10 seconds
Understand Understand Data must be converted into knowledge • The Adaptive Reference Model • A detailed baseline model of what is normal • at a particular point in time • Compares subsequent snapshots and determines if changes have malicious intent. • Based on patented data mining algorithms Powerful Analytics ? • Known Good • Normal • Known Bad
Inform: Actionable View Into Your Environment Inform: An Actionable View Into Your Environment
Act Awareness Enables Precise Action • Automatically derives a custom-built remediation response on-the-fly • Surgically precise and unobtrusive • Removes malware and corrects collateral damage • All remediations are reversible Point Remediation
Triumfant Active Defense: On the Endpoint Patented algorithms that remove malware in minutes • Finds and removes malware that other defenses miss • Does not require signatures or any prior knowledge • Continuous monitoring of the detailed state of the computer provides situational awareness of the entire enterprise • Effective against APTs, polymorphics and sophisticated targeted attacks from determined adversaries
Parting Thought In the time it took me to deliver this speechmore than 4000 new malware threats were detected.