top of page

Threat Analysis

Automatic analysis of crucial actions

A solution dedicated to environment monitoring in order to detect and send real-time alerts of any suspicious action performed with privileged credentials, allowing the security team to

prevent an ongoing attack.

How it works

A list of suspicious commands and behaviors in the environment is classified according to the level of risk. When risks are identified, alerts are issued and consolidated on a graphic dashboard. 

The information security team can therefore take immediate action if necessary.

Key Features

Key features
Graphic dashboards with risk and threat

Graphic dashboards with risk and threat information

Analysis of user.png

Analysis of user sessions with record of abnormality in reports

Recording of command.png

Recording of command input and output logs

Identification of lateral movement.png

Identification of lateral movement and privilege escalation

Alerts with detailed information.png

Alerts with detailed information about the occurrence of suspicious activity

Audit, command alert and blocking.png

Audit, command alert and blocking, even for privileged users

Command scoring.png

Command scoring according to the level of risk of each command

Sending suspicious activity alerts.png

Sending suspicious activity alerts to SIEM/SYSLOG

Benefits

Benefits & capabilities

Reduced response time.png

Reduced response time to attacks

Visibility of threats.png

Visibility of threats associated with privileged accounts

Audit, command alert and blocking.png

Automatic blocking of stolen privileged credentials

Access to all information.png

Access to all information associated with the incident

Ready to have visibility of the
activities performed by specific users?
bottom of page