Sentinel is now the Endpoint Threat Platform (ETP). Our ETP provides teams with the confidence they need to prevent known threats from impacting their business, so they can focus on neutralizing and containing unknown threats.
The Endpoint Threat Platform delivers full-spectrum endpoint security, including advanced Endpoint Detection and Response (EDR) capabilities, using behavior and machine-learning for threat context, endpoint visibility and resiliency against advanced threats.
CounterTack’s Endpoint Threat Platform applies a unique combination of behavioral analysis, machine learning and reputational techniques to counter the most advanced threats to the enterprise security, like Ransomware.
The robust set of capabilities CounterTack equips enterprise security teams with detects and analyzes threats based on behaviors observed in the operating system and in memory, leveraging an algorithm that examines the cause and effect of endpoint state changes.
Applying runtime analysis with memory-based threat context to further predict how threats will spread and infiltrate more machines adds a new dimension to how CounterTack delivers true innovation.
Many solutions can leverage known threats with signature-based detection, which only identify a minimal number of indicators to effectively prevent an exploit or full attack execution. This approach does not solve the problem when an unknown threat hits, because it doesn’t express any indicators that a system not fundamentally built on behavior can detect. Therefore, it also cannot be prevented if its not able to be detected.
CounterTack’s Endpoint Threat Platform gives security and SOC teams an endpoint security platform that is built on one single, powerful endpoint security sensor to detect, prevent, analyze and remediate threats in a dramatically new way.
The Endpoint Threat Platform helps consolidates capabilities including Endpoint Detection & Response (EDR), incident response, forensic investigation and dynamic, behavior-based preventative controls.
The Endpoint Threat Platform delivers actionable intelligence. Enterprise Security teams layer multiple technologies on top of one another, yet often have disconnected results that can’t correlate accurately to produce effective threat detection, prevention or remediation.
CounterTack’s ETP extrapolates intelligence from other security tools and intelligence feeds, and adds more correlated intelligence on top of detection results, helping to produce the most appropriate response, based on threat severity and impact – all under one hyper-converged sensor and anchored on the back-end by a scalable enterprise architecture. Extending Endpoint Detection and Response (EDR) into other powerful capabilities, companies can grow with this platform.
CounterTack’s Endpoint Threat Platform leverages DDNA for enhanced threat detection, to help hunt threats in memory and to help operators predict how threats will play out. DDNA functions as a critical forensic layer of threat intelligence for teams in countering advanced attacks at the binary level, and neutralizing them.
CounterTack’s ETP platform delivers architectural flexibility and feature extensibilities to give teams more visibility into threats across multiple ‘viewpoints’ and DDNA provides teams with a level of predictive analysis unavailable elsewhere in the market.
Dashboarding capabilities in the Endpoint Threat Platform give SOC operators and enterprise security analysts real-time visibility into threats, with the ability quickly drill down to investigate or take action.
The Endpoint Threat Platform exposes threats, delivering contextual data over time to users to track how threats quickly morph, obfuscate and move laterally through endpoint environments. Operators have the ability to prevent the attack from fully executing and can take action to remediate based on behavioral and binary analysis.
Its critical within incident response to have more information on how threats are connected. The Endpoint Threat Platform pulls connected processes, for example, into flexible visualizations for operators to clearly see threats for what they really are.