Overview

The SlashNext Active Cyber Defense System is an enterprise cyber security solution that uses recent advancements in the field of Artificial Intelligence (AI) to solve some of world’s most complex cyber security problems. The learning machine simulates techniques used by some of the world’s best malware researchers effectively automating their cognitive thinking and senses.

The result is a system that is extremely effective at detecting complex cyber-attacks, but hides that complexity behind an elegant and easy to use interface. With an average installation time of thirty minutes, the system can be installed and provide actionable intelligence within hours.

Highlights

True Zero Day Detection

Current solutions are not designed to detect the full spectrum of attacks and concentrate instead on only detecting malicious executables or object based exploits. This leaves attack vectors wide open for attacks involving encrypted payloads, Java Script based exploits and Phishing attempts that don’t involve an object.

The SlashNext Active Cyber Defense System doesn’t rely on a single artifact but engages at all stages of the attack lifecycle making it equally effective against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

Cross Platform Detection

No operating system is inherently safe against vulnerabilities and malware attacks. Hackers target all popular operating systems including Windows, Linux, OSX, iOS and Android. The SlashNext Active Cyber Defense System’s network centric approach allows it to detect threats regardless of operating system.

Incident Response Tools

Building a complete breach defense goes well beyond malware detection efficiency. Once a system generates an alert, remediation and post mortem forensic analysis become paramount. To facilitate these tasks, the SlashNext Active Cyber Defense System includes built-in threat intelligence and incident response tools.

Real-time Blocking

The SlashNext Active Cyber Defense System interfaces with Firewalls, DNS servers and Web proxies to block malicious internet destinations in real-time – preventing data exfiltration and protecting un-infected machines from accessing malicious sites and becoming infected.

Manage with Ease

The SlashNext Active Cyber Defense System’s user interface is easily accessible through Cisco compliant Command Line Interface (CLI), web or native iPad/iPhone applications. A rich interface is key to reducing incident response time. Not only does this interface provide a 360-degree view of the threats targeting the network, but it also provides information on hacker groups behind the attacks and their possible motives. A native smartphone application enables the IT staff to keep a close watch on their network 24/7.

Threat Intelligence

The SlashNext Active Cyber Defense System integrates detailed intelligence on Threat Actors and their possible motives. This detailed intelligence is provided via “Threat Advisories” integrated into the product’s user interface. A typical threat advisory includes, Origin, Common Targets, Core Expertise, Alias, and Brief Description of the hacker group.

No Software Agent Required

No software agent is required on client devices. Instead, the platform actively scans Internet bound traffic in search of suspicious network flows and alerts IT staff only when a threat is detected.

Branch Office Support

The SlashNext Active Cyber Defense System supports up to 500 branch offices bound with one or more Virtual LANs or separated by subnet ranges. Each branch office runs in its own security and management context and has its own dedicated management console accessible via Web, CLI and iOS applications. A tight access control mechanism prevents branch offices from interfering with each other but at the same time gives system admins complete visibility into all branch offices.

3-in-1 Architecture

Enterprise networks are dynamic, complex and geographically disparate systems that present significant security challenges. Remote and mobile users add to the complexity making it nearly impossible for traditional on premise network security solutions to guard all entry points. To solve this problem, in addition to providing an on premise hardware appliance, SlashNext provides a cloud service to protect users when they travel or are outside the corporate network.

The cloud service and hardware appliance may be combined to meet individual company needs. A company with single physical location can opt for a single deployment hardware appliance whereas organizations that have multiple sites can either deploy the SlashNext Active Cyber Defense System within their interconnected WAN to create a private cloud, or opt for a “zero installation” SaaS deployment by connecting directly to the SlashNext Cloud.

Highlights

True Zero Day Detection

Current solutions are not designed to detect the full spectrum of attacks and concentrate instead on only detecting malicious executables or object based exploits. This leaves attack vectors wide open for attacks involving encrypted payloads, Java Script based exploits and Phishing attempts that don’t involve an object.

The SlashNext Active Cyber Defense System doesn’t rely on a single artifact but engages at all stages of the attack lifecycle making it equally effective against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

Cross Platform Detection

No operating system is inherently safe against vulnerabilities and malware attacks. Hackers target all popular operating systems including Windows, Linux, OSX, iOS and Android. The SlashNext Active Cyber Defense System’s network centric approach allows it to detect threats regardless of operating system.

Incident Response Tools

Building a complete breach defense goes well beyond malware detection efficiency. Once a system generates an alert, remediation and post mortem forensic analysis become paramount. To facilitate these tasks, the SlashNext Active Cyber Defense System includes built-in threat intelligence and incident response tools.

Real-time Blocking

The SlashNext Active Cyber Defense System interfaces with Firewalls, DNS servers and Web proxies to block malicious internet destinations in real-time – preventing data exfiltration and protecting un-infected machines from accessing malicious sites and becoming infected.

Manage with Ease

The SlashNext Active Cyber Defense System’s user interface is easily accessible through Cisco complaint Command Line Interface (CLI), web or native iPad/iPhone applications. A rich interface is key to reducing incident response time. Not only does this interface provide a 360-degree view of the threats targeting the network, but it also provides information on hacker groups behind the attacks and their possible motives. A native smartphone application enables the IT staff to keep a close watch on their network 24/7.

Threat Intelligence

The SlashNext Active Cyber Defense System integrates detailed intelligence on Threat Actors and their possible motives. This detailed intelligence is provided via “Threat Advisories” integrated into the product’s user interface. A typical threat advisory includes, Origin, Common Targets, Core Expertise, Alias, and Brief Description of the hacker group.

No Software Agent Required

No software agent is required on client devices. Instead, the platform actively scans Internet bound traffic in search of suspicious network flows and alerts IT staff only when a threat is detected.

Branch Office Support

The SlashNext Active Cyber Defense System supports up to 500 branch offices bound with one or more Virtual LANs or separated by subnet ranges. Each branch office runs in its own security and management context and has its own dedicated management console accessible via Web, CLI and iOS applications. A tight access control mechanism prevents branch offices from interfering with each other but at the same time gives system admins complete visibility into all branch offices.

3-in-1 Architecture

Enterprise networks are dynamic, complex and geographically disparate systems that present significant security challenges. Remote and mobile users add to the complexity making it nearly impossible for traditional on premise network security solutions to guard all entry points. To solve this problem, in addition to providing an on premise hardware appliance, SlashNext provides a cloud service to protect users when they travel or are outside the corporate network.

The cloud service and hardware appliance may be combined to meet individual company needs. A company with single physical location can opt for a single deployment hardware appliance whereas organizations that have multiple sites can either deploy the SlashNext Active Cyber Defense System within their interconnected WAN to create a private cloud, or opt for a “zero installation” SaaS deployment by connecting directly to the SlashNext Cloud.

Highlights

Cross Platform Detection

No operating system is inherently safe against vulnerabilities and malware attacks. Hackers target all popular operating systems including Windows, Linux, OSX, iOS and Android. The SlashNext Active Cyber Defense System’s network centric approach allows it to detect threats regardless of operating system.

True Zero Day Detection

Current solutions are not designed to detect the full spectrum of attacks and concentrate instead on only detecting malicious executables or object based exploits. This leaves attack vectors wide open for attacks involving encrypted payloads, Java Script based exploits and Phishing attempts that don’t involve an object.

The SlashNext Active Cyber Defense System doesn’t rely on a single artifact but engages at all stages of the attack lifecycle making it equally effective against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

Real-time Blocking

The SlashNext Active Cyber Defense System interfaces with Firewalls, DNS servers and Web proxies to block malicious internet destinations in real-time – preventing data exfiltration and protecting un-infected machines from accessing malicious sites and becoming infected.

Incident Response Tools

Building a complete breach defense goes well beyond malware detection efficiency. Once a system generates an alert, remediation and post mortem forensic analysis become paramount. To facilitate these tasks, the SlashNext Active Cyber Defense System includes built-in threat intelligence and incident response tools.

Threat Intelligence

The SlashNext Active Cyber Defense System integrates detailed intelligence on Threat Actors and their possible motives. This detailed intelligence is provided via “Threat Advisories” integrated into the product’s user interface. A typical threat advisory includes, Origin, Common Targets, Core Expertise, Alias, and Brief Description of the hacker group.

Manage with Ease

The SlashNext Active Cyber Defense System’s user interface is easily accessible through Cisco complaint Command Line Interface (CLI), web or native iPad/iPhone applications. A rich interface is key to reducing incident response time. Not only does this interface provide a 360-degree view of the threats targeting the network, but it also provides information on hacker groups behind the attacks and their possible motives. A native smartphone application enables the IT staff to keep a close watch on their network 24/7.

No Software Agent Required

No software agent is required on client devices. Instead, the platform actively scans Internet bound traffic in search of suspicious network flows and alerts IT staff only when a threat is detected.

Branch Office Support

The SlashNext Active Cyber Defense System supports up to 500 branch offices bound with one or more Virtual LANs or separated by subnet ranges. Each branch office runs in its own security and management context and has its own dedicated management console accessible via Web, CLI and iOS applications. A tight access control mechanism prevents branch offices from interfering with each other but at the same time gives system admins complete visibility into all branch offices.

3-in-1 Architecture

Enterprise networks are dynamic, complex and geographically disparate systems that present significant security challenges. Remote and mobile users add to the complexity making it nearly impossible for traditional on premise network security solutions to guard all entry points. To solve this problem, in addition to providing an on premise hardware appliance, SlashNext provides a cloud service to protect users when they travel or are outside the corporate network.

The cloud service and hardware appliance may be combined to meet individual company needs. A company with single physical location can opt for a single deployment hardware appliance whereas organizations that have multiple sites can either deploy the SlashNext Active Cyber Defense System within their interconnected WAN to create a private cloud, or opt for a “zero installation” SaaS deployment by connecting directly to the SlashNext Cloud.

Highlights

Cross Platform Detection

No operating system is inherently safe against vulnerabilities and malware attacks. Hackers target all popular operating systems including Windows, Linux, OSX, iOS and Android. The SlashNext Active Cyber Defense System’s network centric approach allows it to detect threats regardless of operating system.

True Zero Day Detection

Current solutions are not designed to detect the full spectrum of attacks and concentrate instead on only detecting malicious executables or object based exploits. This leaves attack vectors wide open for attacks involving encrypted payloads, Java Script based exploits and Phishing attempts that don’t involve an object.

The SlashNext Active Cyber Defense System doesn’t rely on a single artifact but engages at all stages of the attack lifecycle making it equally effective against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

Real-time Blocking

The SlashNext Active Cyber Defense System interfaces with Firewalls, DNS servers and Web proxies to block malicious internet destinations in real-time – preventing data exfiltration and protecting un-infected machines from accessing malicious sites and becoming infected.

Incident Response Tools

Building a complete breach defense goes well beyond malware detection efficiency. Once a system generates an alert, remediation and post mortem forensic analysis become paramount. To facilitate these tasks, the SlashNext Active Cyber Defense System includes built-in threat intelligence and incident response tools.

Threat Intelligence

The SlashNext Active Cyber Defense System integrates detailed intelligence on Threat Actors and their possible motives. This detailed intelligence is provided via “Threat Advisories” integrated into the product’s user interface. A typical threat advisory includes, Origin, Common Targets, Core Expertise, Alias, and Brief Description of the hacker group.

Manage with Ease

The SlashNext Active Cyber Defense System’s user interface is easily accessible through Cisco complaint Command Line Interface (CLI), web or native iPad/iPhone applications. A rich interface is key to reducing incident response time. Not only does this interface provide a 360-degree view of the threats targeting the network, but it also provides information on hacker groups behind the attacks and their possible motives. A native smartphone application enables the IT staff to keep a close watch on their network 24/7.

No Software Agent Required

No software agent is required on client devices. Instead, the platform actively scans Internet bound traffic in search of suspicious network flows and alerts IT staff only when a threat is detected.

Branch Office Support

The SlashNext Active Cyber Defense System supports up to 500 branch offices bound with one or more Virtual LANs or separated by subnet ranges. Each branch office runs in its own security and management context and has its own dedicated management console accessible via Web, CLI and iOS applications. A tight access control mechanism prevents branch offices from interfering with each other but at the same time gives system admins complete visibility into all branch offices.

3-in-1 Architecture

Enterprise networks are dynamic, complex and geographically disparate systems that present significant security challenges. Remote and mobile users add to the complexity making it nearly impossible for traditional on premise network security solutions to guard all entry points. To solve this problem, in addition to providing an on premise hardware appliance, SlashNext provides a cloud service to protect users when they travel or are outside the corporate network.

The cloud service and hardware appliance may be combined to meet individual company needs. A company with single physical location can opt for a single deployment hardware appliance whereas organizations that have multiple sites can either deploy the SlashNext Active Cyber Defense System within their interconnected WAN to create a private cloud, or opt for a “zero installation” SaaS deployment by connecting directly to the SlashNext Cloud.

Highlights

Cross Platform Detection

No operating system is inherently safe against vulnerabilities and malware attacks. Hackers target all popular operating systems including Windows, Linux, OSX, iOS and Android. The SlashNext Active Cyber Defense System’s network centric approach allows it to detect threats regardless of operating system.

True Zero Day Detection

Current solutions are not designed to detect the full spectrum of attacks and concentrate instead on only detecting malicious executables or object based exploits. This leaves attack vectors wide open for attacks involving encrypted payloads, Java Script based exploits and Phishing attempts that don’t involve an object.

The SlashNext Active Cyber Defense System doesn’t rely on a single artifact but engages at all stages of the attack lifecycle making it equally effective against credential phishing attacks, both object and on-object based exploits, malicious EXEs, post-infection callbacks and data exfiltration.

Real-time Blocking

The SlashNext Active Cyber Defense System interfaces with Firewalls, DNS servers and Web proxies to block malicious internet destinations in real-time – preventing data exfiltration and protecting un-infected machines from accessing malicious sites and becoming infected.

Incident Response Tools

Building a complete breach defense goes well beyond malware detection efficiency. Once a system generates an alert, remediation and post mortem forensic analysis become paramount. To facilitate these tasks, the SlashNext Active Cyber Defense System includes built-in threat intelligence and incident response tools.

Threat Intelligence

The SlashNext Active Cyber Defense System integrates detailed intelligence on Threat Actors and their possible motives. This detailed intelligence is provided via “Threat Advisories” integrated into the product’s user interface. A typical threat advisory includes, Origin, Common Targets, Core Expertise, Alias, and Brief Description of the hacker group.

Manage with Ease

The SlashNext Active Cyber Defense System’s user interface is easily accessible through Cisco complaint Command Line Interface (CLI), web or native iPad/iPhone applications. A rich interface is key to reducing incident response time. Not only does this interface provide a 360-degree view of the threats targeting the network, but it also provides information on hacker groups behind the attacks and their possible motives. A native smartphone application enables the IT staff to keep a close watch on their network 24/7.

No Software Agent Required

No software agent is required on client devices. Instead, the platform actively scans Internet bound traffic in search of suspicious network flows and alerts IT staff only when a threat is detected.

Branch Office Support

The SlashNext Active Cyber Defense System supports up to 500 branch offices bound with one or more Virtual LANs or separated by subnet ranges. Each branch office runs in its own security and management context and has its own dedicated management console accessible via Web, CLI and iOS applications. A tight access control mechanism prevents branch offices from interfering with each other but at the same time gives system admins complete visibility into all branch offices.

3-in-1 Architecture

Enterprise networks are dynamic, complex and geographically disparate systems that present significant security challenges. Remote and mobile users add to the complexity making it nearly impossible for traditional on premise network security solutions to guard all entry points. To solve this problem, in addition to providing an on premise hardware appliance, SlashNext provides a cloud service to protect users when they travel or are outside the corporate network.

The cloud service and hardware appliance may be combined to meet individual company needs. A company with single physical location can opt for a single deployment hardware appliance whereas organizations that have multiple sites can either deploy the SlashNext Active Cyber Defense System within their interconnected WAN to create a private cloud, or opt for a “zero installation” SaaS deployment by connecting directly to the SlashNext Cloud.

Active Cyber Defense System

Product Line

Enterprise Solution

The enterprise solution is deployed in the form of an on-premise appliance. The appliance attaches to the backbone switch’s SPAN port off to the side of the main network path, allowing it to monitor the network and communicate with the SlashNext cloud with no performance impact.

Multiple Branch Solution

The multi Branch solution is designed from the ground up to support installations that integrate several branch offices. In addition to supporting all the features of our Enterprise solution, the multi branch solution offers the ability to separate segments of an enterprise network into locally managed sub segments. A typical installation might include a headquarters location and several branch offices. Each local branch office is presented with their own local view of the network. A super user, typically located at headquarters, sees each branch view, and also a consolidated view of the entire network.

Cloud

The SlashNext Active Cyber Defense cloud based implementation brings the power and flexibility of the cloud to your network. A simple configuration change in your existing network firewall redirects internet bound traffic through the SlashNext data center where the system scans traffic and provides the same level of security as our Enterprise and Multi-tenant subscriptions without the need for an on-site appliance.

Features Comparison

Features

Enterprise
Multi Branch
Cloud
Available in 100 Megabits to 10 Gigabit configuration
Support for multiple branch offices

Management

CLI
Web Application
iPhone App
Cloud based remote management
Support for SlashNext Threat Intelligence Platform
Protection for Remote Users
Zero hardware installation
Native multi tenancy

Security Audit

SlashNext offers various consulting services to help with internal security audits. We will meet with your IT staff on premise, review your security procedures, and install a SlashNext Auditing System within your network. The system will log malicious activity within your network and generate a list of infected machines along with forensic evidence.

This log is examined by our team of expert researchers who will produce a risk assessment report. Armed with this information your IT organization can determine the best remediation plan for your specific circumstance.