The latest release from Cyphort adds three crucial enhancements that further strengthen protection against advanced threats, and significantly help improve the productivity of security analysts and incident response teams. Learn more about each of these capabilities, and read the full press release on the announcement.
Advanced Threat Detection for Cloud-Based Email
For the growing number of organizations using Office 365 and Gmail applications in the cloud, ADF helps minimize the risk of malicious email attacks by automatically analyzing and quarantining all embedded URLs and attachments within each email. This new feature, which employs ADF’s patent-pending machine learning and behavioral analysis technologies, works seamlessly with existing email servers and anti-spam gateways. It allows organizations to minimize the risk of growing ransomware and phishing attacks, and analyze more than two million emails each day. Download Use Case.
Automated Response to Newly Discovered Threats
When ADF discovers a new threat inside the network, its open API architecture enables it to automatically create and enforce new policies for most in-line security tools, enabling those tools to prevent a recurrence of a similar threat in the future. In addition, ADF can work with Network Access Control (NAC) devices and endpoint security solutions to isolate and restrict the movement of traffic on devices known to be infected. These auto-mitigation capabilities not only help protect networks, but they also enable incident response (IR) teams spend more time on forensic priorities. Download Solution Brief.
Consolidated Analytics of Security Incidents for Hosts and Users
The open API architecture of ADF allows it to ingest information (e.g. alerts and event data) from virtually any security tool in the network, then correlate all disparate data into a single consolidated, contextual view of the malicious incident. This enables security analysts to see a cohesive, detailed timeline of events and alerts generated by various security tools, all related to the activity associated with the compromised host or user. From there, analysts and IR teams can investigate each event more carefully to determine the best course of action based on the progression and severity of threat activity. Download Use Case.
Cyphort Enhances Security, Automation, and Analytics of its Adaptive Detection Fabric
Read the full press release for all the announcement details. Press Release