Cynet Overview
CYNET 360 PLATFORM OVERVIEW
Cynet 360 is the world’s first Autonomous Breach Protection that natively integrates the endpoint,
network, and user prevention & detection of XDR with automated investigation and remediation, backed
by 24/7 MDR services—placing end to end breach protection within reach of any organization, regardless
of its security team size and skill. Through its complete threat coverage, Cynet 360 eliminates the need
for complex multi-product security stacks, making robust breach protection within reach for any
organization, regardless of its size and security skills.
Cynet 360 is purpose-built to deliver complete protection, based on three pillars: prevention and
detection of all common and advanced threats, full automation of the entire response flow from initial
detection to complete eradication of the malicious activity and continuous monitoring of this process by
security professionals to ensure and elevate the precision and quality of the process.
EDR SOLUTION XDR SOLUTION
Based on average rating For 2020
Recognized as an Automated EDR in The Best Endpoint Detection and Response
Gartner’s EDR Market Guide 2019 (EDR) Solutions of 2020
1
Key Benefits
Coverage from endpoint, Zero touch protection Full protection both on- Rapid time to value with
user, and network- based from common and prem and cloud full environment
attacks in a single solution advanced threats workloads coverage in minutes
Autonomous Breach Protection
2
XDR SECURITY MDR
AUTOMATION
Endpoint Protection Investigation Alert Monitoring
Multilayered protection against malware, Automated root cause and impact analysis Prioritize and notify customer on critical
ransomware, exploits and file less attacks events
Network Protection Finding Attacks Investigation
Protecting against scanning attacks, MITM, Actionable conclusions on the attack’s Detailed analysis reports on the attacks
lateral movement and data exfiltration origin and its affected entities that targeted the customer
User Protection Remediation Proactive Threat Hunting
Preset behavior rules coupled with Elimination of malicious presence, activity Search for malicious artifacts and IoC
dynamic behavior profiling to detect and infrastructure across user, network within the customer’s environment
malicious anomalies and endpoint attacks
Deception Visualization Incident Response Guidance
Preset behavior rules coupled with Intuitive flow layout of the attack and the Remote assistance in isolation and removal
dynamic behavior profiling to detect automated response flow of malicious infrastructure, presence and
malicious anomalies activity
Prevention is a Step. Protection is a Journey
Protection must be end to end. Prevention or Detection of an attack's instance is critical – but it’s only
the beginning. One must assume that the malicious artifact that was identified is a mere tip of an iceberg.
Cynet 360 is the only solution that triggers an automated investigation following each endpoint, user or
network alert, fully disclosing its root cause and scope and applying all the required
3
OS COMPATIBILITY
Cynet 360 is compatible with the following Operating Systems:
Microsoft 32\64 Bit Linux 32\64 Bit Mac 64 Bit
Windows XP SP3+ Red Hat 6.9 + MacOS High Sierra (10.13)
Windows Vista SP1+ Fedora 23+ MacOS Mojave (10.14)
Windows 7 SP1+ Ubuntu 16.04+ MacOS Catalina (10.15)
Windows 8/8.1 CentOS 6.9+ MacOS Big Sur (11)
Windows 10 SUSE 12+ MacOS Monterey (12)
Windows Server 2003 SP2 Debian 9+ *Supports Apple M1 chip
Windows Server 2008/2008R2 Oracle Enterprise Linux 7.6
Windows Server 2012/2012R2 Amazon Linux
Windows Server 2016 Amazon Linux 2
Windows Server 2019
Cynet’s unique dissolvable execution technique guarantees there is no installation process, no reboot
required, no user performance impact and no conflict with Kernel operation.
SYSTEM REQUIREMENTS
Hardware Specifications – applies for on premise installations
The following hardware requirements will apply to the proposed architecture and are tailored for use of
physical or virtual server hardware.
1,000-5,000 Assets 5,000-10,000 Assets 10,000-20,000 Assets 20,000 -30,0001 Assets
4 Physical core processor 8 Physical core processor 16 Physical core 24 Physical core processor
(Intel compatible) (Intel compatible) processor (Intel compatible)
(Intel compatible)
32 GB RAM 48 GB RAM 96GB RAM
64GB RAM
500 GB HD (Physical SSD 1.5 TB HD (Physical SSD 3 TB HD (Physical SSD non
non shared Disk) non shared Disk) 2 TB HD (Physical SSD non shared Disk)
shared Disk)
1
For systems greater than 30,000 endpoints please consult with a Cynet solution architect.
4
CYNET CUSTOMER SERVICES
Cynet customer services are comprised of three components:
Customer Success
Cynet's Customer Success team will guide you through the deployment process and make sure that your
goals are met. Once you purchase a subscription to Cynet360 platform, a Customer Success Manager will
be assigned your account.
Cynet 360 Complete
Endpoint Protection
(AV & NextGen AV)
Endpoint Detection and Response
Threat Intelligence
Network Analytics
User Behavior Analytics
24x7 Threat Hunting
Sandbox
Vulnerability Assessment
Security Operations Center Unlimited
Deception
UBA Verification
Incident Response Service
Support 24X7
5
Technical Support
Our technical experts will assist you with any technical issues you may encounter.
Sunday to Friday during business hours, contact us at: Support@[Link]
CyOps 24/7
The Cynet cyber SWAT team (“CyOps”) operates 24x7x365 and is comprised of experienced security
specialists. CyOps personnel are trained to actively engage with customers whose Cynet 360 installation
has detected a threat within the customer organization.
CyOps Commitments
• Operational 24x7x365 days a year.
• Monitor alerts from the customer’s Cynet 360 installation and contact the customer’s contact
persons via approved communication channels, based on the Alert Severity Matrix below.
• CyOps staff will be available to the customer to provide recommended remediation steps of the
detected threat.
Severity CyOps Response Response Time
Critical *Call and email the customer Within 2 hours
High *Call and email the customer Within 4 hours
Medium Email Customer Within 12 hours
Low Email Customer Within 24 hours
*CyOps will contact customer via phone when Cynet CyOps determines that the alert indicates of a cyber
security incident that should be brought to the customer's attention.
CyOps Contact details
Phone (US): +1-347-474-0048 | Phone (International): +44-203-290-9051 | soc@[Link]