[vc_row full_width=”stretch_row_content” el_class=”breadcrumb-header ” css=”.vc_custom_1521833161378{background-color: rgba(0,0,0,0.8) !important;*background-color: rgb(0,0,0) !important;}”][vc_column][vc_column_text]SOLUTIONS > ADVANCED THREAT DETECTION[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row” el_class=”row-header” css=”.vc_custom_1522173235170{background-image: url(/wp-content/uploads/2018/03/atd-header-w_blk_tint-waves-2x.jpg?id=13649) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column width=”3/4″][vc_column_text]

SS8 BreachDetect

Time Machine for Advanced Threat Detection 

Recursive analysis of high-definition network metadata accelerates the threat detection and incident response workflow—pointing to specific compromised devices.[/vc_column_text][vcex_button url=”https://vimeo.com/168299622″ align=”left” text_transform=”capitalize” custom_hover_background=”#000000″ custom_color=”#ffffff” margin=”20px 0px 0px 0px” custom_hover_color=”#ffffff” custom_background=”#f16722″ border=”none” classes=”fancybox-video”]Watch Demo[/vcex_button][vcex_button url=”#breachdetect-resources” target=”local” align=”left” text_transform=”capitalize” custom_hover_background=”#000000″ custom_color=”#ffffff” margin=”20px 0px 0px 0px” custom_hover_color=”#ffffff” custom_background=”#f16722″ border=”none”]Resources[/vcex_button][/vc_column][vc_column width=”1/4″][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” enable_first_overlay=”true” first_overlay_opacity=”100″ first_background_type=”image” first_background_image=”14527″ first_background_image_size=”full” first_background_size=”cover” parallax=”vcex_parallax” parallax_image=”10567″ css=”.vc_custom_1521905592861{padding-top: 70px !important;padding-bottom: 150px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”alt-style-heading-row” parallax_speed=”.2″][vc_column][vc_column_text css=”.vc_custom_1521848198427{padding-bottom: 100px !important;}”]

INSIDE THE SOLUTION

[/vc_column_text][vc_column_text css=”.vc_custom_1521848297322{padding-bottom: 70px !important;}”]

Advanced Threat Detection

SS8 BreachDetect provides device-centric alerting and powerful network investigation capabilities that accelerates threat detection times and reduces or eliminates threat dwell time.

[/vc_column_text][vc_row_inner gap=”4″ el_class=”box-row”][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090618393{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-final.png?id=14671) !important;}”][vc_column_text css=”.vc_custom_1522091378733{margin-top: 6% !important;margin-right: 6% !important;margin-bottom: 6% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Software Sensor
High-performance application-aware software sensors deploy with ease passively on the network to generate high-definition records (HDRs) that are stored for analysis

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090634212{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091429327{margin-top: 6% !important;margin-right: 6% !important;margin-bottom: 6% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Enrichment
User ID data from a directory store (e.g. Active Directory) combines with reputation data from Webroot® and any other source of threat intelligence to correlate with network history

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090747818{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091444718{margin-top: 6% !important;margin-right: 6% !important;margin-bottom: 6% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Recursive Analytics
SS8’s data retention and analytics platform (DRAP), continuously analyzes recorded network history and scores network behaviors tied to specific devices and users

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090741878{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091454056{margin-top: 6% !important;margin-right: 6% !important;margin-bottom: 6% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

BreachDetect Discovery
Simplified workflows with device-centric alerting and robust visualizations built for the security analyst take the guesswork out of hunting for threats

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vcex_button url=”/technology/” align=”center” color=”orange” text_transform=”capitalize” classes=”btn” custom_hover_background=”#000000″ custom_color=”#f16722″ margin=”top:80px|right:0px|bottom:0px|left:0px” custom_hover_color=”#ffffff” custom_background=”#ffffff” border=”none”]Technology[/vcex_button][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row min_height=”200px” css=”.vc_custom_1522457865789{background-color: #000000 !important;}”][vc_column][vc_column_text]Above “Advanced Threat Detection” section from:Advanced Threat Detection page[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” enable_first_overlay=”true” first_overlay_opacity=”100″ first_background_type=”image” first_background_image=”14539″ first_background_image_size=”full” first_background_size=”cover” parallax=”vcex_parallax” parallax_image=”10567″ css=”.vc_custom_1521907557032{padding-top: 70px !important;padding-bottom: 150px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”alt-style-heading-row” parallax_speed=”.2″][vc_column][vc_column_text css=”.vc_custom_1521867800898{padding-bottom: 100px !important;}”]

INTERNET COMMUNICATION DISCOVERY KEY COMPONENTS

[/vc_column_text][vc_column_text css=”.vc_custom_1521833540575{margin-bottom: 70px !important;}”]

Key Components

The SS8 IC Discovery solution provides the query and filtering needed to precisely retrieve the order-relevant Internet communication records (ICRs). SS8 has worked extensively with law enforcement and intelligence agency analysts to create ICR-driven workflows and visual analytics tools that makes the job of deriving actionable intelligence from ICRs fast and easy.

[/vc_column_text][vc_row_inner gap=”4″ remove_bottom_col_margin=”true” el_class=”box-row”][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090693343{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-final.png?id=14671) !important;}”][vc_column_text css=”.vc_custom_1522089430814{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Sensor + PXE
Deployed on the internal network to records East/West traffic

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090699576{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091655921{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Analytics
DRAP rewinds network history and pattern of life activity

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090705224{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091677713{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

IC Discovery
IC Discovery interface used to extract pattern of life for SOI

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090712503{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522091699267{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Intellego
Used by law enforcement to analyze pattern of life

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vcex_button url=”/technology/” align=”center” color=”orange” text_transform=”capitalize” classes=”btn” custom_hover_background=”#000000″ custom_color=”#f16722″ margin=”top:80px|right:0px|bottom:0px|left:0px” custom_hover_color=”#ffffff” custom_background=”#ffffff” border=”none”]The Technology[/vcex_button][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row min_height=”200px” css=”.vc_custom_1522457865789{background-color: #000000 !important;}”][vc_column][vc_column_text]Above “Key Components” section from: Internet Communications Discovery page

[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” enable_first_overlay=”true” first_overlay_opacity=”100″ first_background_type=”image” first_background_image=”14510″ first_background_image_size=”full” first_background_size=”cover” parallax=”vcex_parallax” parallax_image=”10567″ css=”.vc_custom_1521896025764{padding-top: 70px !important;padding-bottom: 150px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”alt-style-heading-row” parallax_speed=”.2″][vc_column][vc_column_text css=”.vc_custom_1521866239884{padding-bottom: 100px !important;}”]

INSIDER THREAT DETECTION KEY COMPONENTS

[/vc_column_text][vc_column_text css=”.vc_custom_1521833777207{padding-bottom: 70px !important;}”]

Key Components

The SS8 Insider Threat Detection (ITD) solution provides the proactive alerting and investigation workflow needed to precisely identify suspected insiders and track their pattern of life within the network.

[/vc_column_text][vc_row_inner gap=”4″ el_class=”box-row”][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090693343{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-final.png?id=14671) !important;}”][vc_column_text css=”.vc_custom_1522089430814{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Sensor + PXE
Deployed on the internal network to records East/West traffic

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090699576{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522090322433{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Enrichment
User ID collected and correlated via directory store (Active Directory, DHCP)

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090705224{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522090371954{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

Analytics
SS8 DRAP engine stores and scores user/device activity over time

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”boxcol” width=”1/4″ css=”.vc_custom_1522090712503{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-image: url(/wp-content/uploads/2018/03/isobox-arrow-final.png?id=14677) !important;}”][vc_column_text css=”.vc_custom_1522090366252{margin-top: 3% !important;margin-right: 6% !important;margin-bottom: 3% !important;margin-left: 6% !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #ec501b !important;}”]

ITD Discovery
SS8 ITD discovery interface alerts on flagged users, and enables querying of file transfer activity

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vcex_button url=”/technology/” align=”center” color=”orange” text_transform=”capitalize” classes=”btn” custom_hover_background=”#000000″ custom_color=”#f16722″ margin=”top:80px|right:0px|bottom:0px|left:0px” custom_hover_color=”#ffffff” custom_background=”#ffffff” border=”none”]The Technology[/vcex_button][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” enable_first_overlay=”true” first_overlay_opacity=”100″ first_background_type=”image” first_background_image=”14510″ first_background_image_size=”full” first_background_size=”cover” parallax=”vcex_parallax” parallax_image=”10567″ css=”.vc_custom_1521896025764{padding-top: 70px !important;padding-bottom: 150px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}” el_class=”alt-style-heading-row” parallax_speed=”.2″][vc_column][vc_column_text css=”.vc_custom_1521866239884{padding-bottom: 100px !important;}”]

INSIDER THREAT DETECTION KEY COMPONENTS

[/vc_column_text][vc_column_text css=”.vc_custom_1521833777207{padding-bottom: 70px !important;}”]

Key Components

The SS8 Insider Threat Detection (ITD) solution provides the proactive alerting and investigation workflow needed to precisely identify suspected insiders and track their pattern of life within the network.

[/vc_column_text][vc_row_inner][vc_column_inner][vc_single_image image=”13641″ alignment=”center”][vcex_button url=”/technology/” align=”center” color=”orange” text_transform=”capitalize” classes=”btn” custom_hover_background=”#000000″ custom_color=”#f16722″ margin=”top:80px|right:0px|bottom:0px|left:0px” custom_hover_color=”#ffffff” custom_background=”#ffffff” border=”none”]The Technology[/vcex_button][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row min_height=”200px” css=”.vc_custom_1522457865789{background-color: #000000 !important;}”][vc_column][vc_column_text]Above “Key Components” section from: Insider Threat Detection page

—I think the first one (4 boxes) was a test Jim was working on?

[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row_content” parallax_speed_bg=”1″ enable_first_overlay=”true” first_overlay_opacity=”70″ first_background_color=”#ffffff” parallax=”content-moving” css=”.vc_custom_1521884843244{padding-top: 70px !important;padding-bottom: 70px !important;}” el_class=”alt-style-heading-row”][vc_column css=”.vc_custom_1462282184724{padding-bottom: 50px !important;}”][vc_column_text css=”.vc_custom_1521884667604{margin-bottom: 100px !important;}”]

POWERFUL SIEM INTEGRATION

[/vc_column_text][vc_column_text]

The powerful integration of SS8 technology with the SIEM provides an excellent discovery application that treats the network as an endpoint, enabling customers to quickly discover the most sophisticated attacks, and investigate breach behavior with pinpoint accuracy—down to specific devices of interest.

 

[/vc_column_text][vc_row_inner][vc_column_inner el_class=”item-col”][vc_single_image image=”13732″ alignment=”center”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row min_height=”200px” css=”.vc_custom_1522457865789{background-color: #000000 !important;}”][vc_column][vc_column_text]Above “Powerful SIEM Integration” section from: Security Interface Enrichment page

—This section needs to be updated. ALL of these sections will be the same across site.[/vc_column_text][/vc_column][/vc_row]