0% found this document useful (0 votes)
149 views7 pages

Autonomous Breach Protection Guide

Cynet 360 is an autonomous breach protection platform that integrates endpoint, network, and user protection with automated investigation and remediation capabilities. It eliminates the need for complex security stacks by providing complete threat coverage in a single solution. Cynet 360 uses three pillars - prevention and detection of all threats, full automation of the response process, and continuous monitoring by security experts. It protects organizations of any size from common and advanced attacks across endpoints, users, and networks.

Uploaded by

heisemberg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views7 pages

Autonomous Breach Protection Guide

Cynet 360 is an autonomous breach protection platform that integrates endpoint, network, and user protection with automated investigation and remediation capabilities. It eliminates the need for complex security stacks by providing complete threat coverage in a single solution. Cynet 360 uses three pillars - prevention and detection of all threats, full automation of the response process, and continuous monitoring by security experts. It protects organizations of any size from common and advanced attacks across endpoints, users, and networks.

Uploaded by

heisemberg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cynet Overview

CYNET 360 PLATFORM OVERVIEW


Cynet 360 is the world’s first Autonomous Breach Protection that natively integrates the endpoint,
network, and user prevention & detection of XDR with automated investigation and remediation, backed
by 24/7 MDR services—placing end to end breach protection within reach of any organization, regardless
of its security team size and skill. Through its complete threat coverage, Cynet 360 eliminates the need
for complex multi-product security stacks, making robust breach protection within reach for any
organization, regardless of its size and security skills.

Cynet 360 is purpose-built to deliver complete protection, based on three pillars: prevention and
detection of all common and advanced threats, full automation of the entire response flow from initial
detection to complete eradication of the malicious activity and continuous monitoring of this process by
security professionals to ensure and elevate the precision and quality of the process.

EDR SOLUTION XDR SOLUTION


Based on average rating For 2020

Recognized as an Automated EDR in The Best Endpoint Detection and Response


Gartner’s EDR Market Guide 2019 (EDR) Solutions of 2020

1
Key Benefits

Coverage from endpoint, Zero touch protection Full protection both on- Rapid time to value with
user, and network- based from common and prem and cloud full environment
attacks in a single solution advanced threats workloads coverage in minutes

Autonomous Breach Protection

2
XDR SECURITY MDR
AUTOMATION

Endpoint Protection Investigation Alert Monitoring

Multilayered protection against malware, Automated root cause and impact analysis Prioritize and notify customer on critical
ransomware, exploits and file less attacks events

Network Protection Finding Attacks Investigation

Protecting against scanning attacks, MITM, Actionable conclusions on the attack’s Detailed analysis reports on the attacks

lateral movement and data exfiltration origin and its affected entities that targeted the customer

User Protection Remediation Proactive Threat Hunting

Preset behavior rules coupled with Elimination of malicious presence, activity Search for malicious artifacts and IoC

dynamic behavior profiling to detect and infrastructure across user, network within the customer’s environment

malicious anomalies and endpoint attacks

Deception Visualization Incident Response Guidance

Preset behavior rules coupled with Intuitive flow layout of the attack and the Remote assistance in isolation and removal
dynamic behavior profiling to detect automated response flow of malicious infrastructure, presence and

malicious anomalies activity

Prevention is a Step. Protection is a Journey


Protection must be end to end. Prevention or Detection of an attack's instance is critical – but it’s only
the beginning. One must assume that the malicious artifact that was identified is a mere tip of an iceberg.
Cynet 360 is the only solution that triggers an automated investigation following each endpoint, user or
network alert, fully disclosing its root cause and scope and applying all the required

3
OS COMPATIBILITY
Cynet 360 is compatible with the following Operating Systems:

Microsoft 32\64 Bit Linux 32\64 Bit Mac 64 Bit

Windows XP SP3+ Red Hat 6.9 + MacOS High Sierra (10.13)


Windows Vista SP1+ Fedora 23+ MacOS Mojave (10.14)
Windows 7 SP1+ Ubuntu 16.04+ MacOS Catalina (10.15)
Windows 8/8.1 CentOS 6.9+ MacOS Big Sur (11)
Windows 10 SUSE 12+ MacOS Monterey (12)
Windows Server 2003 SP2 Debian 9+ *Supports Apple M1 chip
Windows Server 2008/2008R2 Oracle Enterprise Linux 7.6

Windows Server 2012/2012R2 Amazon Linux

Windows Server 2016 Amazon Linux 2

Windows Server 2019

Cynet’s unique dissolvable execution technique guarantees there is no installation process, no reboot
required, no user performance impact and no conflict with Kernel operation.

SYSTEM REQUIREMENTS
Hardware Specifications – applies for on premise installations
The following hardware requirements will apply to the proposed architecture and are tailored for use of
physical or virtual server hardware.

1,000-5,000 Assets 5,000-10,000 Assets 10,000-20,000 Assets 20,000 -30,0001 Assets

4 Physical core processor 8 Physical core processor 16 Physical core 24 Physical core processor
(Intel compatible) (Intel compatible) processor (Intel compatible)
(Intel compatible)
32 GB RAM 48 GB RAM 96GB RAM
64GB RAM
500 GB HD (Physical SSD 1.5 TB HD (Physical SSD 3 TB HD (Physical SSD non
non shared Disk) non shared Disk) 2 TB HD (Physical SSD non shared Disk)
shared Disk)

1
For systems greater than 30,000 endpoints please consult with a Cynet solution architect.

4
CYNET CUSTOMER SERVICES
Cynet customer services are comprised of three components:
Customer Success
Cynet's Customer Success team will guide you through the deployment process and make sure that your
goals are met. Once you purchase a subscription to Cynet360 platform, a Customer Success Manager will
be assigned your account.

Cynet 360 Complete


Endpoint Protection
(AV & NextGen AV)

Endpoint Detection and Response

Threat Intelligence

Network Analytics

User Behavior Analytics

24x7 Threat Hunting

Sandbox

Vulnerability Assessment

Security Operations Center Unlimited

Deception

UBA Verification

Incident Response Service

Support 24X7

5
Technical Support
Our technical experts will assist you with any technical issues you may encounter.
Sunday to Friday during business hours, contact us at: Support@[Link]

CyOps 24/7
The Cynet cyber SWAT team (“CyOps”) operates 24x7x365 and is comprised of experienced security
specialists. CyOps personnel are trained to actively engage with customers whose Cynet 360 installation
has detected a threat within the customer organization.

CyOps Commitments
• Operational 24x7x365 days a year.
• Monitor alerts from the customer’s Cynet 360 installation and contact the customer’s contact
persons via approved communication channels, based on the Alert Severity Matrix below.
• CyOps staff will be available to the customer to provide recommended remediation steps of the
detected threat.

Severity CyOps Response Response Time

Critical *Call and email the customer Within 2 hours

High *Call and email the customer Within 4 hours

Medium Email Customer Within 12 hours

Low Email Customer Within 24 hours

*CyOps will contact customer via phone when Cynet CyOps determines that the alert indicates of a cyber
security incident that should be brought to the customer's attention.

CyOps Contact details

Phone (US): +1-347-474-0048 | Phone (International): +44-203-290-9051 | soc@[Link]

You might also like