1. DarkTrace: Antigena Network
Antigena Network is the world’s leading Autonomous Response technology for the enterprise. Powered by self-learning cyber AI, Antigena Network instantly interrupts attacks across cloud services, IoT and the corporate network with surgical precision, even if the threat is novel or highly targeted. Neutralizes targeted, self-spreading attacks.
This tool marks Darktrace’s active self-defense tool.
2. X Sophos Intercept Tool
Intercept X is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Intercept X Advanced combines the capabilities of Intercept X and Central Endpoint into a single solution and single agent. Intercept X Advanced with EDR also integrates intelligent endpoint detection and response (EDR). It is managed by our unified console, Sophos Central. No servers to build—just log in to download the agent and configure all your policies from one place.
3. IBM QRadar Advisor
Security analysts feel the pressures of lack of cybersecurity talent and job fatigue and are often unable to manage the enormous volume of insights day-to-day. This leaves businesses vulnerable to unaddressed security threats. Enter QRadar Advisor with Watson. It automates routine SOC tasks, finds commonalities across investigations and provides actionable feedback to analysts, freeing them up to focus on more important elements of the investigation and increase analyst efficiency.
4. Vectra’s Cognito
The Cognito platform for NDR is in 100% service of detecting and responding to attacks inside cloud, data center, IoT, and enterprise networks. The job is to find and stop those attacks early and with certainty. The Cognito platform meets SOC 2 Type 2 compliance standards, ensuring the security and confidentiality of our partners’ and customers’ data. Always-learning behavioral models use AI to efficiently find hidden and unknown attackers in real time.
A MACHINE-LEARNING TOOLKIT FOR LARGE-SCALE ECRIME FORENSICS. DefPloreX, uses a combination of machine-learning and visualization techniques to practically turn original unstructured data into meaningful high-level descriptions. Real-time information on incidents, breaches, attacks and vulnerabilities, for example, are efficiently processed and condensed into objects that are easily browsable making them suitable for efficient large-scale eCrime forensics and investigations.
Malware analysts routinely use the Strings program during static analysis in order to inspect a binary’s printable characters. However, identifying relevant strings by hand is time consuming and prone to human error. Larger binaries produce upwards of thousands of strings that can quickly evoke analyst fatigue, relevant strings occur less often than irrelevant ones, and the definition of “relevant” can vary significantly among analysts.
7. Symantec’s Targeted Attack analytics Tool (TAA)
Symantec big data analytics and targeted attack research, and Endpoint Detect and Response (EDR) supplement existing security tools, enabling enterprises to expose previously unknown attacks. Only Symantec brings together rich telemetry, artificial intelligence, advanced machine learning, and research expertise to identify hard-to-detect attacks with high confidence (both at the machine and enterprise levels).