Intensity provides the next-generation end point security solutions against un-known Exploits, Viruses and Trojans. The first product, the technology, provides a real time protection for the enterprises market, from targeted and un-known “Zero Day Attacks”.
is a comprehensive security solution designed for monitoring system events on user end points.
Hacker is using a revolutionary technology to inspect the end point workstation and detect potential threats. The detection, and in a later phase prevention, is possible due to the use of a Behavioral Patterns Map, or BPM, an exceptional analysis technique, developed by the best research team, to identify a threat by its kernel based behaviour, thus can detect all threat, targeted, known and unknown, whether it is a Virus, Worm, Malware, Exploit (internal external), Trojan or any other attack.
As the Zero-day threat is becoming significantly intimidating to the enterprise network, this solution is the only real solution enabling network security administrator to “detect the undetected”.
Our solution is comprised of 3 main components, installed within a LAN-WAN environment of an enterprise organisation: Agent, Paranoid Server and Monitoring Environment Detection is performed at the workstation itself, in the kernel level, and the inspection results are displayed in real-time, at the Monitoring Environment (ME), a web based dashboard, enabling the IT administrator, to proactively pursue and remove the threat shortly after it is discovered. Additionally, the ME provides a quick view of the network information security status, using an intuitive Overall Security Level alert or a detailed analysis.
Once the system is installed and configured, the administrator has full visibility and control over the network activity, in terms of threat managements, and fast detection of potential attacks.
Server is a main component of the solution, which collects the results of all Agents’ analyze results, including each event’s priority, Id, originated IP and more, in a dedicated data base. By collecting all data in its data base, the Server enables the ME to extract and display the data in real time, based on their priority rating.
Paranoid Server supports a “black-box” methodology, thus can be used as an appliance, or as software based installation within the enterprise network environment. All communication between the Paranoid Agent and Server is encrypted, and uses a proprietary protocol.
next-generation end point security solutions against un-known Exploits, Viruses and Trojans. The first product, the technology breakthrough Paranoid, provides a real time protection for the enterprises market, from targeted and un-known “Zero Day Attacks”.For additional information please contact roni roytman - +972-528364394, firstname.lastname@example.org