ANTIVIRUS RACCOLTA LOG WEB SECURITY - Distline S.r.l - Sede Operativa: Piazza della Serenissima, 20/201 - 31033 Castelfranco Veneto (TV)
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
ANTIVIRUS RACCOLTA LOG WEB SECURITY Distline S.r.l. - Sede Operativa: Piazza della Serenissima, 20/201 - 31033 Castelfranco Veneto (TV) T. +39 0423 615262 www.distline.com E. info@distline.com
CylancePROTECT ® Continuous Threat Prevention Powered by Artificial Intelligence Benefits Think Beyond Traditional Antivirus For years, prevention products’ primary threat protection was based on signatures. • AI Driven Prevention Assuming all attacks at a business had been seen before, using signatures made reduces the strain on the sense. Today, malware mutates daily, even hourly, making signature-based prevention endpoint compared to tools obsolete. traditional solutions It is time to think beyond traditional antivirus. • No signatures mean less human effort to manage Think CylancePROTECT. • No cloud or new hardware required minimizes total cost of ownership About Cylance® Cylance uses artificial intelligence to deliver prevention-first, predictive security products and specialized security services that change how organizations approach endpoint security. Cylance’s security solutions CylancePROTECT is an integrated threat prevention solution that combines the provide full spectrum predictive power of artificial intelligence (AI) to block malware infections with additional security threat prevention and controls that safeguard against script-based, fileless, memory, and external device- visibility across the enterprise, based attacks. combatting threats such as malware, ransomware, Unlike traditional endpoint security products that rely on signatures and behavior fileless malware, malicious analysis to detect threats in the environment, CylancePROTECT: scripts, weaponized docs, and • Uses AI, not signatures, to identify and block known and unknown malware from other attack vectors. With AI running on endpoints based malware prevention, application and script control, • Delivers prevention against common and unknown (zero-day) threats without a memory protection, device cloud connection policy enforcement, root • Continuously protects the endpoint without disrupting the end-user cause analysis, threat hunting, With unmatched effectiveness, minimal system impact, and zero-day prevention, automated threat detection CylancePROTECT protects endpoints and organizations from compromise. and response, coupled with expert security services, Cylance can protect endpoints without increasing staff workload or costs.
CylancePROTECT Features Controls which devices can Resilient AI model be used in the environment, prevents zero-day Device Usage eliminating external devices True Zero-Day payloads from executing. as a possible attack vector. Prevention Policy Enforcement Proactively identifies malicious Field-proven AI inspects use of memory (fileless any application attempting attacks) with immediate to execute on an endpoint AI Driven Malware Memory Exploitation automated prevention before it executes. Prevention Detection and Prevention responses. Ensures fixed-function Maintains full control of devices are in a pristine state when and where scripts are continuously, eliminating the Script run in the environment. Application Control for drift that occurs with Management Fixed-Function Devices unmanaged devices. Common CylancePROTECT Use Cases CylancePROTECT provides full-spectrum threat prevention covering these common security use cases: • The need to identify and block malicious executables • Preventing malicious email attachments from detonating their payloads • Controlling where, how, and who can execute scripts • Predicting and preventing successful zero-day attacks • Managing the usage of USB devices, prohibiting unauthorized devices from being used • Eliminating the ability for attackers to use fileless malware attack techniques on protected endpoints The Benefits of CylancePROTECT Comprehensive Security Smooth Business Operations Zero-Day Payload Prevention Full-spectrum autonomous threat Whisper-quiet prevention ensures Eliminates the risk of an attack exploiting a prevention simplifies the security stack business operations are not disrupted zero-day from being successful +1-844-CYLANCE sales@cylance.com www.cylance.com 400 Spectrum Center Drive, Irvine, CA 92618 ©2018 Cylance Inc. Cylance® and CylancePROTECT® and all associated logos and designs are trademarks or registered trademarks of Cylance Inc. All other registered trademarks or trademarks are property of their respective owners. 20180830-2855
BUSINESS LOG SERVER Potente e Flessibile La versione Server di Business Log consente la raccolta centralizzata dei LOG Access all'interno di una macchina adibita a LOG Box. L'installazione di BusinessLOG Server consente la raccolta dei log presenti in tutta la struttura aziendale in dominio. Il processo di raccolta non richiede la presenta di agent sui vari dispositivi da acquisire.
BUSINESS LOG CLOUD Semplice e Veloce L'installazione dell'agent Businesslog Cloud permette la raccolta Realtime dei LOG Access. L'upload nel datacenter delle informazioni raccolte è accessibile attraverso un Visualizzatore o tramite accesso HTTPs.
Tabella Principale LOG La tabella dinamica consente la visualizzazione chiara e dettagliata di tutti i log . Tabella Principale LOG L'applicazione di Filtri e le molteplici query consentono una chiara e immediata interpretazione dell'attività
LOG Accesso File Visualizza chi accede, modifica, legge, copia, elimina file e cartelle. Allarmi Il sistema di allarme consente di ricevere immediatamente una notifica riferita alla tipologia di evento accaduto. ES: Reset Password, Accessi Remoti etc.
Inventario Hardware e Software Inventario automatico, storico modifiche hardware e software ed esportazione in 4 formati. Grafici Grafici e statistiche per una visualizzazione immediata dell'attività .
You can also read