Sertalink
Sertalink

Traditional approaches have major flaws.
The top 3 major flaws of traditional security approaches according to a Gartner Research note*

Lack of security training

It is assumed that widely-known threat vectors are covered by defense technologies that are often left in monitoring mode after unintended business disruption, due to false positives or misconfigurations.

Dwell time is an astounding 49-150 days (depending on industry) according to the 2020 Verizon DBIR

Legacy approaches

Reuse old security approaches to secure new ways of conducting business.

68% of the time, security environments were not able to prevent or detect the approaches being tested.
– Mandiant 2019 Security Effectiveness Report

Lack of the right tools

Spend disproportionate amounts of resources and budgets trying to block a threat that cannot be blocked.

Data exfiltration techniques and tactics were successful 67% of the time.

Why now

The Cognito NDR Platform 

Cognito Detect

Detect More
Eliminate alert fatigue and focus on what matters most with real-time attacker behavior detections
Empower Teams
Expand human expertise and increase speed by having AI do the thinking. Our security domain-based AI adds value to your security team.
Address Threats
Respond to in-progress threats with renewed confidence and precision while minimizing the impact on security workflows and business operations.

Attackers can run, But they can’t hide

Cognito Detect provides threat detection coverage from the cloud to user and IoT devices

Detect More

     See threat behaviors for unknown and known attacks by tracking internal reconnaissance and lateral movement.

     Identify which host devices, workloads and user accounts that are at the center of an attack.

    Expose stealthy low-and-slow attacks. The Cognito platform never rests and enables security teams to use their time wisely.

Empower Teams

 Automate a related chain of events into a single attack campaign to understand the scope and meaning, and prioritize threats                            based on risk and privilege.

 Triage the highest-risk threat detections automatically and mitigate attacks that pose the greatest risk to your organization –                             all in real time.

Investigate behavior-based threat signals, not volumes of anomalies. Security context is instantly available for conclusive                                       answers about threat behaviors. 

Rich Metadata
  • Network traffic
  • System, authorization and SaaS logs
  • loCs (STIX)
Identify attacker behavior
  • Machine Learning
  • Behavioral analytics 
  • Network effect
Automazed analysis
  • Triage and correlate threats to hosts
  • Prioritize hosts by risk 
  • Uncover attack campaigns 
Drive response
  • Intuitive Ul and rich context
  • Enable automated response
  • Firewall, endpoint, Siem and NAC integration

Address Threats

Respond with accurate and high-confidence signals and eliminate the noise that causes false positives.

Enforce signals from threat behaviors based on user identity and host device – intelligently at the source.

Add value to existing investments by sharing enforcement data from Cognito with third-party security solutions. 

Command and control
  • Externak remote access
  • Hidden DNS tunnel 
  • Hidden HTTP/S tunnel
  • Suspicious relay 
  • Suspect domain activity 
  • Malware update 
  • Peer-to-peer
  • Pulling instructions 
  • Suspicious HTTP
  • TOR activity 
  • Threat intel match 
Reconnaissance
  • Internal darknet scan
  • Port scan
  • Port sweep
  • SMB account scan 
  • Kerberos account scan 
  • File share enumeration 
  • Suspicious LDAP query 
  • RDP recon 
  • RDC recon
Laternal movement
  • Suspicious remote exec
  • Suspicious remote desktop
  • Suspicious admin
  • Shell knocker
  • Automated replication 
  • Brute-force attack 
  • SMB brute-force
  • Kerberos brute force
  • Suspicous kerberos client 
  • Suspicious kerberos account
  • Kerberos server activity 
  • Ransomware file activity 
  • SQL injection activity 
  • Privilege access analytics  
Exfiltration and botnet monetization

Exfiltration 

  • Data smuggler
  • Smash and grab
  • Hidden DNS tunnel
  • Hidden HTTP/S tunnel

Botnet monetization

  • Abnormal web or ad activity
  • Cryptocurrency mining
  • Brute-force attack
  • Outbound DoS
  • Outbound port sweep
  • Outbound spam

Cognito Detect Integrates with Entire Your Security Stack

Native integrations including EDR, SIEMs and orchestration tools

Open Robust API for customizable integrations

Product

X