{"id":5233,"date":"2020-07-03T11:24:03","date_gmt":"2020-07-03T10:24:03","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=5233"},"modified":"2020-07-03T11:53:22","modified_gmt":"2020-07-03T10:53:22","slug":"attackscape-viewer","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/attackscape-viewer\/","title":{"rendered":"AttackScape Viewer"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<h2>Behavior Analysis<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; custom_margin=&#8221;4px|||||&#8221;]<\/p>\n<div class=\"right-item sticky-widget\">\n<div class=\"theiaStickySidebar\">\n<div class=\"tab-cont\">\n<h4>Focus. Analyze. Identify Anomalies.<\/h4>\n<p>With increasingly sophisticated malware hitting enterprise networks daily, it is critical to guard the crown jewels effectively to combat these threats, especially, since they are getting more difficult to identify. However, such threats can be averted.<\/p>\n<p>With LinkShadow, organizations can analyze and profile network entities to uncover early signs of a breach, and underlying malicious behavior to pinpoint threat actors hiding in plain sight. Get alerted if a system is misused by detecting whether the entity is behaving normally by comparing historic and current port usage patterns, whether the right protocols are being utilized on accessed ports, and gaining visibility into relationships with other network entities.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; custom_padding=&#8221;5px|||||&#8221;]<\/p>\n<h4>Identity Intelligence<\/h4>\n<p>[\/et_pb_text][et_pb_video src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/LinkShadow-Technical-Training-Identity-Intelligence.mp4&#8243; _builder_version=&#8221;3.24&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<ul>\n<li>Visual trend analytics on user behavior including authentication patterns, application usage habits, etc.<\/li>\n<li class=\"content\">\n<p>Pin point high risk users based on machine learning and clustering of peer behavioral patterns.<\/p>\n<\/li>\n<li class=\"content\">\n<p>Constantly monitor high-profile users by adding them to the &#8216;Watch List&#8217;, and prioritize alerts on activities of Super Users.<\/p>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<h2>Asset AutoDiscovery<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_video src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/LinkShadow-Technical-Training-Asset-Auto-Discovery-Module.mp4&#8243; _builder_version=&#8221;3.24&#8243;][\/et_pb_video][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<ul>\n<li class=\"d-flex\">\n<div class=\"content\">\n<p>Automatically discover all devices across your entire network, providing insight into device type and OS, plus validation of whether devices are managed or unmanaged, and whether endpoint security is installed.<\/p>\n<\/div>\n<\/li>\n<li class=\"d-flex\">\n<div class=\"content\">\n<p>Use anomaly detection technology built on advanced machine learning, to learn and profile the organization&#8217;s unique behavior, and alert in real-time on threats that are specific to your network.<\/p>\n<\/div>\n<\/li>\n<li class=\"d-flex\">\n<div class=\"content\">\n<p>Visualize device connectivity within your network, and identify whether a device is communicating over the right protocols, with the right port numbers.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<h4>Find. Monitor. Alert for Anomalous Behavior.<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<p>You may take your eyes off your network, but rest assured we won&#8217;t. With the dynamic nature of the network environment, it is fundamental to continuously monitor and collect real-time data across systems, to adapt your security program and better protect the business.<\/p>\n<p>LinkShadow allows you to classify nodes through automated discovery of the entire IT infrastructure within the enterprise, to ensure all assets are protected and up-to-date for the compliance audit. Drill down into the details to answer critical questions around how many systems are managed and unmanaged in your network, do they have endpoint security or not, and what is the type of device.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<h2>Threat Shadow<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<h4>See. Detect. Flag threats in real-time.<\/h4>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<\/p>\n<p>ThreatShadow presents CISO with an overall compilation of AI from all the Machine Learning algorithms built into the system, allowing CISO to focus on real threats that matter. ThreatShadow helps CISO draw the line between false positive and critical incidents. Using intelligent threat scoring and collective profiling of entities and users, ThreatShadow identifies risks taking place in the environment right now and presents CISO with visual representation indicating where did the risk originate from as well as where is it heading to in case the threat is laterally moving across the network and assets.<\/p>\n<p>ThreatShadow allows CISO to cross compare the current environment situation with previous dates to verify if certain threats are persisting across time. This feature helps CISO identify the most vulnerable assets and users as well as evaluate the efficiency of other security systems such as firewalls and end-point security.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_video src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/LinkShadow-Technical-Training-ThreatShadow.mp4&#8243; _builder_version=&#8221;3.24&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Behavior Analysis Focus. Analyze. Identify Anomalies. With increasingly sophisticated malware hitting enterprise networks daily, it is critical to guard the crown jewels effectively to combat these threats, especially, since they are getting more difficult to identify. However, such threats can be averted. With LinkShadow, organizations can analyze and profile network entities to uncover early signs [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-5233","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AttackScape Viewer | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberrange.be\/attackscape-viewer\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AttackScape Viewer | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberrange.be\/attackscape-viewer\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-03T10:53:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/#local-place\"},\"address\":{\"@id\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/#webpage\",\"url\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/\",\"name\":\"AttackScape Viewer | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2020-07-03T10:24:03+00:00\",\"dateModified\":\"2020-07-03T10:53:22+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberrange.be\/attackscape-viewer\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.cyberrange.be\/attackscape-viewer\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/5233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=5233"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/5233\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=5233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}