Nothing Special   »   [go: up one dir, main page]

Percept EDR - Datasheet - 21

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

PERCEPT

Cloud Security
Platform

Sequretek is a global cybersecurity company. We offer end-to-


end security in the areas of enterprise threat monitoring,
incident response, device security, identity & access governance
through our own AI driven Percept Cloud Security Platform.

www.sequretek.com info@sequretek.com
PERCEPT EDR PERCEPT XDR PERCEPT IGA
Endpoint Extended Identity
Detection & Detection & Governance &
Response Response Administration

PERCEPT Cloud Security Platform

Endpoints Servers Containers Network VMs Cloud Applications Databases

Take Control of your enterprise security

▪ Enterprise scale, easy to use and cloud


native

▪ AI driven threat detection, protection,


remediation and response

▪ Quick implementation and


integration capabilities

▪ End-to-End ownership and


management of Sequretek products

▪ Reduce Total Cost of Ownership (TCO)


while simplifying security

www.sequretek.com info@sequretek.com
PERCEPT EDR
Ensure end-to-end detection, protection and response with
AI based EDR for endpoints, servers and cloud environments

PERCEPT EDR PERCEPT EDR + MDR


▪ Endpoint Detection & Response (EDR) ▪ Percept EDR (all)
Protect against
advanced attacks ▪ Next Generation Antivirus (NGAV) ▪ Sandbox – Emulator

Percept EDR delivers ▪ Endpoint Monitoring ▪ EDR Analytics Workbench


comprehensive
▪ EDR Analytics ▪ EDR Telemetry Correlation
detection, protection
and response to protect ▪ EDR Management Platform ▪ Threat Hunting
against all attacks types
like known, unknown, ▪ EDR Administration & Reporting ▪ Automated Incident Response
file based, file-less and
in-memory malware. ▪ On-Agent AI ▪ Application Whitelisting

▪ Device Control – USB ▪ Vulnerability Management

Key Benefits On-Agent AI – Protect Devices in Real-time


Percept EDR uses AI-based algorithms and behavior technologies
to detect internal and external threats. The on-agent AI ensures
Single Agent EDR with protection even when devices are not updated or are in an
on-agent AI offline mode. Percept EDR employs an emulator for zero-day and
hidden malware detection, whereas suspicious data is identified
using in-memory exploits detection techniques.
Protect against zero-
day, in-memory,
ransomware & other Rich EDR Telemetry
malware
Percept EDR captures rich telemetry data and uses security
workbench analytics to better protect against advanced cyber
24/7 monitoring attacks. The platform also allows users to create different use
management & cases for threat hunting and environment intelligence. All the
ownership alerts and events across the environment are available with a
long retention period for security workbench analysis.

Application Whitelisting
& Vulnerability
Management Granular Inventory View
Percept EDR captures granular inventory and provides a real-
time view of all the assets – devices, processes running and
Day 1 ready to
operating systems and applications. This can be triaged and
deploy & use correlated in real -time to identify most vulnerable systems and
prepare a proactive response plan to fix the same.

www.sequretek.com info@sequretek.com
AI based Detection Key
EDR detects and stops suspicious process flows leading to outbound communications, thus preventing Benefits
different malware attacks such as ransomware which try to establish communication to attacker’s
command and control (C&C) systems before carrying out an attack.
MDR Endpoint
Telemetry
Correlation
Automated Response
Percept EDR’s behavior and reputation-based detection, threat hunting and incident response help
enterprises reduce the workload on security teams. This allows the security teams to be more effective &
helps them to focus on their core objectives. Threat
Intelligence and
Threat Hunting
MDR & EDR Analytics
Percept EDR with MDR capabilities provides 24/7 threat hunting. This integration ensures very high
effectiveness for threat detection and remediation across the environment. It also provides actionable Automated
intelligence and alerts customer teams for proactive guidance and hygiene management to prevent likely Incident
attacks. Response

Application Whitelisting
Percept EDR coupled with application white-listing allows tracking of all applications by dynamically
In-memory
determining what needs to be allowed. Policy based application white-listing furthermore reduces the
Attack Forensics
attack surface and ensures that only approved software versions are running on endpoints and servers.

Vulnerability Management
EDR Percept with vulnerability management feature scans the entire environment with reference to all MDR Analytics
known and reported vulnerabilities to identify and categorize vulnerable devices. Percept EDR can Workbench
integrate with in-built or third party solutions which would allow the vulnerabilities to be patched

Deployment Architecture Global Threat


Sequretek
Honeypot
Intelligence

Sequretek content
(Malware
Intelligence, Patch, Threat Intel Feeds
Good Database, ) (Public and Private)

Remote AI: Security Big Data


Users Analytics
PERCEPT EDR +
MDR Platform
▪ Deep Learning AI Models

▪ Telemetry and Event Data Enterprise Security


Dashboard
Office Users ▪ Response

▪ Analytics

Threat Insight and


Intelligence

Cloud Users PERCEPT Cloud Security Platform

www.sequretek.com info@sequretek.com
Take Control of Your Security
To know more about our products email us at info@sequretek.com
or visit our website: www.sequretek.com

© 2021 Sequretek. All rights Reserved

You might also like