
Lack of security training
It is assumed that widely-known threat vectors are covered by defense technologies that are often left in monitoring mode after unintended business disruption, due to false positives or misconfigurations.
Dwell time is an astounding 49-150 days (depending on industry) according to the 2020 Verizon DBIR
Legacy approaches
Reuse old security approaches to secure new ways of conducting business.
68% of the time, security environments were not able to prevent or detect the approaches being tested.
– Mandiant 2019 Security Effectiveness Report
Lack of the right tools
Spend disproportionate amounts of resources and budgets trying to block a threat that cannot be blocked.
Data exfiltration techniques and tactics were successful 67% of the time.
* Gartner Report: How to Respond to the 2020 Threat Landscape
Why now

The Cognito NDR Platform
Cognito Detect

Detect More

Empower Teams

Address Threats
Attackers can run, But they can’t hide

Detect More
See threat behaviors for unknown and known attacks by tracking internal reconnaissance and lateral movement.
Identify which host devices, workloads and user accounts that are at the center of an attack.
Expose stealthy low-and-slow attacks. The Cognito platform never rests and enables security teams to use their time wisely.
Empower Teams
Automate a related chain of events into a single attack campaign to understand the scope and meaning, and prioritize threats based on risk and privilege.
Triage the highest-risk threat detections automatically and mitigate attacks that pose the greatest risk to your organization – all in real time.
Investigate behavior-based threat signals, not volumes of anomalies. Security context is instantly available for conclusive answers about threat behaviors.

Rich Metadata
- Network traffic
- System, authorization and SaaS logs
- loCs (STIX)

Identify attacker behavior
- Machine Learning
- Behavioral analytics
- Network effect

Automazed analysis
- Triage and correlate threats to hosts
- Prioritize hosts by risk
- Uncover attack campaigns

Drive response
- Intuitive Ul and rich context
- Enable automated response
- Firewall, endpoint, Siem and NAC integration
Address Threats
Respond with accurate and high-confidence signals and eliminate the noise that causes false positives.
Enforce signals from threat behaviors based on user identity and host device – intelligently at the source.
Add value to existing investments by sharing enforcement data from Cognito with third-party security solutions.
Command and control
- Externak remote access
- Hidden DNS tunnel
- Hidden HTTP/S tunnel
- Suspicious relay
- Suspect domain activity
- Malware update
- Peer-to-peer
- Pulling instructions
- Suspicious HTTP
- TOR activity
- Threat intel match
Reconnaissance
- Internal darknet scan
- Port scan
- Port sweep
- SMB account scan
- Kerberos account scan
- File share enumeration
- Suspicious LDAP query
- RDP recon
- RDC recon
Laternal movement
- Suspicious remote exec
- Suspicious remote desktop
- Suspicious admin
- Shell knocker
- Automated replication
- Brute-force attack
- SMB brute-force
- Kerberos brute force
- Suspicous kerberos client
- Suspicious kerberos account
- Kerberos server activity
- Ransomware file activity
- SQL injection activity
- Privilege access analytics
Exfiltration and botnet monetization
Exfiltration
- Data smuggler
- Smash and grab
- Hidden DNS tunnel
- Hidden HTTP/S tunnel
Botnet monetization
- Abnormal web or ad activity
- Cryptocurrency mining
- Brute-force attack
- Outbound DoS
- Outbound port sweep
- Outbound spam

Cognito Detect Integrates with Entire Your Security Stack
Native integrations including EDR, SIEMs and orchestration tools
Open Robust API for customizable integrations

