Uploaded on Jan 15, 2023
Seceon’s aiXDR solution discovers and remediates a comprehensive list of threats, exploits, attacks, suspicious activities, and non-conformance/non-compliance items, including Zero-Day and advanced malware with sophisticated evasive techniques. The Table below is an indicative subset of the exhaustive threat models implemented in the product. Call Us: +1 (978)-923-0040
Seceon’s Comprehensive Cybersecurity Platform - Seceon
Seceon’s Comprehensive Cybersecurity Platform -
Seceon
+1 ( 978)-923-0040 [email protected]
Seceon’s Comprehensive
Cybersecurity Platform
by Randy Blasik | Jan 6, 2023 | aiXDR, Cyber Security Company, Cybersecurity Solution,
Ransomware Detection, Service Security Providers | 0 comments
Type your text
Seceon’s comprehensive platform includes more than 15 tools like ai, ml,
vulnerability assessment, SIEM, SOAR, UEBA, NBAD, NTA, EDR, TI, but our
focus for today is an area that frequently comes up in conversation with
customers and partners alike.
Seceon’s Comprehensive Cybersecurity Platform -
Seceon
Does your current cybersecurity Solution discover and remediate
unwanted bot activities, malware, lateral movements, credential theft,
and insider threats both on-prem and across the cloud?
Seceon’s aiXDR solution discovers and remediates a comprehensive list of
threats, exploits, attacks, suspicious activities, and non-
conformance/non-compliance items, including Zero-Day and advanced
malware with sophisticated evasive techniques. The Table below is an
indicative subset of the exhaustive threat models implemented in the
product.
Threat Descript io
Models n
Trojan Horse Suspicious Trojan activity detected in the
Activity network.
Unusual activity by an insider with valid
Insider
credentials. This could indicate a user with
Threat/Compromised
malicious intent or potential compromise of
Credentials
that user’s credentials.
An alert to indicate policy violations
Policy based on provisioned rules (granular
Violation policies like micro- segmentation of
network).
A host is suspected to be infected based on
Suspicious Infected
Host correlation of all indicators of compromise.
A network of private computers infected with
Botnet malicious software and controlled as a group
Detected without the owners’ knowledge, e.g., to send
spam or syn messages.
Spank Spank attack is a form of DDoS attack
Attack where the attacker utilizes multicast
addresses as source
Seceon’s Comprehensive Cybersecurity Platform -
Seceon
Threat Models Description
addresses to multiply the bandwidth consumed
by the
network and the targeted host.
Detection of potential data breach or data
Potential Data Raid
raid from critical assets.
System has observed traffic patterns that
Potential Exploit
would indicate an attempt to exploit
system vulnerability.
Attacks that use massive amount of traffic
saturating Volumetric DDoS the bandwidth of the target. Volumetric attacks are
easy
to generate using
Protocol ( TCP/UDP) Flood.
Potential RC-4 Encryption Vulnerability
RC4 Attack
exploitation detected
Suspicious Account An account created for malicious intent by an
Creation – Insider Threat Insider Administrator.
Brute Force Attack Brute Force login attack on a particular host.
Known Virus or Host infected with virus or worm with known
Worm Infection signature (hash)
System has observed traffic patterns that
Potential Web Exploit would indicate attempts to exploit Web
Application vulnerability.
System has observed traffic patterns that
Potential Vulnerability would indicate an attempt by a host to
Exploit exploit application vulnerabilities present on
other host(s)
ICMP DDoS ICMP FLOOD based attack detection
Server or endpoint infected with malicious
Malware Infected
Host software (including fileless)
Seceon’s Comprehensive Cybersecurity Platform -
Seceon
Threat Descript io
Models n
An insider who could be causing leakage of
business sensitive information including privacy
Insider Threat
(USB) protected data (e.g PII, PHI), advertently or
inadvertently from a high- value asset to an
USB drive
Unusual user activity is mapped with entities
(databases, servers, applications) accessed and
Data correlated with spike in data transferred from an
Exfi ltration internal IP/Port to another internal or external
IP/Port to arrive at data exfiltration as potential
Threat Indicator
DDoS Amplification based DDoS attack
Amplifi cation detection
DDoS TCP TCP SYN based DDoS attack
Syn detection.
Dangerous malware that can encrypt the entire
Ransomwar disk and hold endpoints/server hostage in lieu of
e demand for ransom
DNS DNS
Tunneling Tunneling
Compromised User Credentials are suspected to be
Credentials compromised
Socially engineered email that allures the
Phishing
Attack recipient to a spurious website with malicious
intent
Zero Day Malware without prior detection and known
Malware signature
Attempts by a malware (worm or botnet) to
move from one endpoint/server to another with
Lateral
Movement the intent of enhancing damage and/or reaching
its target (server/application/database/storage)
Command & Control Attempts by a malware to establish
Center (C&C) communication with its Command & Control
Center through various means – Backdoors,
Domain Generation Algorithms (DGA), Beaconing
etc.
Address - 238 Littleton Road Suite #206 Westford, MA
01886
Phone no - +1 (978)-923-0040
Email Id - [email protected]
Website - https://www.seceon.com/
Comments