Seceon’s Comprehensive Cybersecurity Platform - Seceon


Companyseceon

Uploaded on Jan 15, 2023

Category Business

Seceon’s aiXDR solution discovers and remediates a comprehensive list of threats, exploits, attacks, suspicious activities, and non-conformance/non-compliance items, including Zero-Day and advanced malware with sophisticated evasive techniques. The Table below is an indicative subset of the exhaustive threat models implemented in the product. Call Us: +1 (978)-923-0040

Category Business

Comments

                     

Seceon’s Comprehensive Cybersecurity Platform - Seceon

Seceon’s Comprehensive Cybersecurity Platform - Seceon  +1 ( 978)-923-0040  [email protected] Seceon’s Comprehensive Cybersecurity Platform by Randy Blasik | Jan 6, 2023 | aiXDR, Cyber Security Company, Cybersecurity Solution, Ransomware Detection, Service Security Providers | 0 comments Type your text Seceon’s comprehensive platform includes more than 15 tools like ai, ml, vulnerability assessment, SIEM, SOAR, UEBA, NBAD, NTA, EDR, TI, but our focus for today is an area that frequently comes up in conversation with customers and partners alike.  Seceon’s Comprehensive Cybersecurity Platform - Seceon Does your current cybersecurity Solution discover and remediate unwanted bot activities, malware, lateral movements, credential theft, and insider threats both on-prem and across the cloud? Seceon’s aiXDR solution discovers and remediates a comprehensive list of threats, exploits, attacks, suspicious activities, and non- conformance/non-compliance items, including Zero-Day and advanced malware with sophisticated evasive techniques. The Table below is an indicative subset of the exhaustive threat models implemented in the product. Threat Descript io Models n Trojan Horse Suspicious Trojan activity detected in the Activity network. Unusual activity by an insider with valid Insider credentials. This could indicate a user with Threat/Compromised malicious intent or potential compromise of Credentials that user’s credentials. An alert to indicate policy violations Policy based on provisioned rules (granular Violation policies like micro- segmentation of network). A host is suspected to be infected based on Suspicious Infected Host correlation of all indicators of compromise. A network of private computers infected with Botnet malicious software and controlled as a group Detected without the owners’ knowledge, e.g., to send spam or syn messages. Spank Spank attack is a form of DDoS attack Attack where the attacker utilizes multicast addresses as source Seceon’s Comprehensive Cybersecurity Platform - Seceon Threat Models Description addresses to multiply the bandwidth consumed by the network and the targeted host. Detection of potential data breach or data Potential Data Raid raid from critical assets. System has observed traffic patterns that Potential Exploit would indicate an attempt to exploit system vulnerability. Attacks that use massive amount of traffic saturating Volumetric DDoS the bandwidth of the target. Volumetric attacks are easy to generate using Protocol ( TCP/UDP) Flood. Potential RC-4 Encryption Vulnerability RC4 Attack exploitation detected Suspicious Account An account created for malicious intent by an Creation – Insider Threat Insider Administrator. Brute Force Attack Brute Force login attack on a particular host. Known Virus or Host infected with virus or worm with known Worm Infection signature (hash) System has observed traffic patterns that Potential Web Exploit would indicate attempts to exploit Web Application vulnerability. System has observed traffic patterns that Potential Vulnerability would indicate an attempt by a host to Exploit exploit application vulnerabilities present on other host(s) ICMP DDoS ICMP FLOOD based attack detection Server or endpoint infected with malicious Malware Infected Host software (including fileless) Seceon’s Comprehensive Cybersecurity Platform - Seceon Threat Descript io Models n An insider who could be causing leakage of business sensitive information including privacy Insider Threat (USB) protected data (e.g PII, PHI), advertently or inadvertently from a high- value asset to an USB drive Unusual user activity is mapped with entities (databases, servers, applications) accessed and Data correlated with spike in data transferred from an Exfi ltration internal IP/Port to another internal or external IP/Port to arrive at data exfiltration as potential Threat Indicator DDoS Amplification based DDoS attack Amplifi cation detection DDoS TCP TCP SYN based DDoS attack Syn detection. Dangerous malware that can encrypt the entire Ransomwar disk and hold endpoints/server hostage in lieu of e demand for ransom DNS DNS Tunneling Tunneling Compromised User Credentials are suspected to be Credentials compromised Socially engineered email that allures the Phishing Attack recipient to a spurious website with malicious intent Zero Day Malware without prior detection and known Malware signature Attempts by a malware (worm or botnet) to move from one endpoint/server to another with Lateral Movement the intent of enhancing damage and/or reaching its target (server/application/database/storage) Command & Control Attempts by a malware to establish Center (C&C) communication with its Command & Control Center through various means – Backdoors, Domain Generation Algorithms (DGA), Beaconing etc. Address - 238 Littleton Road Suite #206 Westford, MA 01886 Phone no - +1 (978)-923-0040 Email Id - [email protected] Website - https://www.seceon.com/