Today’s threat landscape features constant evolution of in threats sophistication, with increasing use of defense-evading malware and fileless variants: Exploits, Macros, Powershell, WMI and LOLbins. This radically expands the need of zero day protection in place.
Cynet prevents execution of malicious code by enforcing a chain of interlocking protection layers on executed files and running processes
Integrate threat intelligence with ML static analysis to discover malicious attributes of trojans, worms exploits and other attack vectors
Malware / Ransomware / Backdoors / Crypto-miners / Banking trojans / Rootkits / Worms
Apply multiple monitoring vectors to pinpoint behavioral patterns that indicate malicious activity is taking place.
Exploits (documents & browser) / Macros / LOLbins / Powershell & WMI / Scripts / Thread Injections
Cynet NGAV integrates multiple prevention technologies to maximize the points in which standard and zero day attacks can be terminated.
Identify and prevent execution of malware with known signatures.
Utilize over 30 live feeds of various Indicators of Compromise.
Identify files with high similarity to know malware hashes.
Ensure only legitimate process can gain access to critical areas in memory.
Analyze files before execution using unsupervised machine learning to discover malicious attributes.
Monitor process at runtime and terminate upon detection of malicious behavior.
Cynet NGAV iis a native part of Cynet 360, the first Autonomous Breach Protection Platform that utilizes Cynet Sensor Fusion™ to protect the entire environment by delivering the following capabilities :
Planting fake passwords, data files, configurations and network connections to lure attackers to reveal their presence