Percept EDR - Datasheet - 21
Percept EDR - Datasheet - 21
Percept EDR - Datasheet - 21
Cloud Security
Platform
www.sequretek.com info@sequretek.com
PERCEPT EDR PERCEPT XDR PERCEPT IGA
Endpoint Extended Identity
Detection & Detection & Governance &
Response Response Administration
www.sequretek.com info@sequretek.com
PERCEPT EDR
Ensure end-to-end detection, protection and response with
AI based EDR for endpoints, servers and cloud environments
Application Whitelisting
& Vulnerability
Management Granular Inventory View
Percept EDR captures granular inventory and provides a real-
time view of all the assets – devices, processes running and
Day 1 ready to
operating systems and applications. This can be triaged and
deploy & use correlated in real -time to identify most vulnerable systems and
prepare a proactive response plan to fix the same.
www.sequretek.com info@sequretek.com
AI based Detection Key
EDR detects and stops suspicious process flows leading to outbound communications, thus preventing Benefits
different malware attacks such as ransomware which try to establish communication to attacker’s
command and control (C&C) systems before carrying out an attack.
MDR Endpoint
Telemetry
Correlation
Automated Response
Percept EDR’s behavior and reputation-based detection, threat hunting and incident response help
enterprises reduce the workload on security teams. This allows the security teams to be more effective &
helps them to focus on their core objectives. Threat
Intelligence and
Threat Hunting
MDR & EDR Analytics
Percept EDR with MDR capabilities provides 24/7 threat hunting. This integration ensures very high
effectiveness for threat detection and remediation across the environment. It also provides actionable Automated
intelligence and alerts customer teams for proactive guidance and hygiene management to prevent likely Incident
attacks. Response
Application Whitelisting
Percept EDR coupled with application white-listing allows tracking of all applications by dynamically
In-memory
determining what needs to be allowed. Policy based application white-listing furthermore reduces the
Attack Forensics
attack surface and ensures that only approved software versions are running on endpoints and servers.
Vulnerability Management
EDR Percept with vulnerability management feature scans the entire environment with reference to all MDR Analytics
known and reported vulnerabilities to identify and categorize vulnerable devices. Percept EDR can Workbench
integrate with in-built or third party solutions which would allow the vulnerabilities to be patched
Sequretek content
(Malware
Intelligence, Patch, Threat Intel Feeds
Good Database, ) (Public and Private)
▪ Analytics
www.sequretek.com info@sequretek.com
Take Control of Your Security
To know more about our products email us at info@sequretek.com
or visit our website: www.sequretek.com