The Enterprise is Under Attack

Hostile nation states and hacker groups are estimated to have stolen information on over 126.3M Americans in the recent OPM, Anthem, Premera, UCLA and Excellus breaches. This equates to almost 40% of the US population. In all cases security measures including Anti-Virus Software, NextGen Firewalls, Intrusion Prevention Systems (IPS), and Secure Gateways were unable to detect and prevent the theft.

The Threat Landscape has Changed

The “bad guys” have gotten much smarter. They are well funded and have considerable technical resources. Using encrypted payloads and well documented weaknesses in existing products, hackers easily evade outdated detection techniques including Signatures, Sandboxes and DNS reputation services. State-of-the-art protection requires a new approach that actively takes the battle to the hacker’s front door.

no signatures

Cognitive Thinking

Today's cyber threats easily evade existing detection technologies but they are not able to evade a researcher’s trained mind. Human researchers routinely find malware that technologies miss. Humans use their intuition and senses along with analytical reasoning to classify the good from the bad, and the malicious from the non-malicious. At SlashNext we have codified this process and automated the thinking of some of the world’s best researchers to build a better system.

The SlashNext Active Cyber Defense System uses an advanced form of Artificial Intelligence specifically, a Dynamic Knowledge Based System (KBS) to emulate human cognitive thinking. Clues gathered throughout an attack sequence and active threat intelligence feed the system’s machine learning engine, allowing it to rapidly identify threats with pin point accuracy – much like a human researcher.

Greater Coverage

Traditional detection systems only protect against some types of object based exploits. Engaged at all stages of the attack lifecycle the SlashNext Active Cyber Defense System protects against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

coverage

No Noise

Most systems report hundreds or thousands of possible threats with varying levels of confidence. Sifting through all of these alerts can be overwhelming for an incident response team. Breaking from this legacy model of presenting IT staff with many weak signals, the SlashNext Active Cyber Defense System introduces a new approach where staff is presented with only a single malicious/not-malicious verdict. This verdict accurately pin points an infected machine and provides forensic evidence for IT staff to take appropriate action.

News & Media

Atif Mushtaq of SlashNext

at BOOTSTRAPPING IN AMERICA

Blog

  • Zero-Hour Multi Brand Phish

    Popular global brands like Yahoo, Gmail, Microsoft, and DropBox are commonly used for Credential Phishing attacks. Typically the attacker creates a replica of the brand's Sign-in or Password recovery page and atte More...

  • PowerWare - A malware built on lies

    A couple of weeks ago the folks at Carbon Black discovered a More...

View More Blog Posts

See what you’ve been missing