2020 'ASTORS' Finalists Edition | Page 39

single in-network attack source and displays it in a simple , easy to use interface .

www . AmericanSecurityToday . com 2020 FINALISTS Edition -

The readout includes the details about the system ( such as system name , IP address , logged on user , etc .), a timeline view , and the events originating from the system in reverse chronological order that includes all event data .

Additionally , the dashboard shows first , second , and third-order hops from the system based on stored credentials and misconfigurations , and a means to initiate a partner integration to isolate the endpoint .

It even includes direct links to any forensic files and data captured by the decoys for quick downloads , such as packet capture files , malware analysis reports , memory forensics analysis , and the data and binary files themselves .

This dashboard aids in analysis and investigations by putting all the details the investigator would need in a single source , fully correlated , and ready to action .

DECEPTION TECHNOLOGY IN THE SECURITY STACK

Close the detection gap and reduce dwell time by detecting in-network threats that other security controls miss .

The ThreatDefend platform also offers DecoyDocs that provide a counterintelligence function to provide information on the intent of the attacker and the information it is targeting .

DecoyDocs have a beaconing technology that phones home whenever anyone opens them ,

39