New release of the Defensys Endpoint v. 1.8

Defensys company announced the extension of Defensys Endpoint functionalities. New features are aimed at improving corporate network security from current cyber threats and raising efficiency of IT infrastructure monitoring process.

Defensys continues to upgrade the Endpoint technology by adding new functions for a better security level and monitoring of IT systems. In the new release Defensys has significantly upgraded technical audit section. Now users can view expertise results in a more comprehensive way, that makes vulnerabilities analysis easier and enables faster remedial action. Moreover, it’s now possible to add own policies and modify installed checks by adapting audits to particular requirements and company’s tasks.

Integration with the Defensys TDP has been added to the Defensys Endpoint v. 1.8. Due to this, lures which simulate vulnerabilities in the corporate network making it more attractive for hackers, can be placed in one click. For instance, the Defensys Endpoint helps to place such lures as false accounts, saved sessions, and SSH keys. This approach reduces the cost of deploying and updating simulated infrastructure.

Therefore, the Defensys team has also integrated the option of installing and managing Sysmon module for Windows OS into the product. Sysmon is a powerful tool for system event monitoring that can detect suspicious activity on computers and prevent potential threats. The product update includes the ability to not only generate events on Linux using its own modules, but also offers CS specialists a convenient tool for Windows.

“At Defensys, we are committed to creating technology that will fully satisfy our customers. We do this by improving our products, adding new features and enhancing user experience” – commented Andrey Chechetkin, Deputy CEO at Defensys. “We also closely monitor new threats and vulnerabilities to timely develop countermeasures and incorporate them into our solutions.”

The Defensys Endpoint technology expands functionalities of other technologies and offers additional advantages for users. Thanks to the Defensys Endpoint each user is able to conduct detailed asset inventory, detect threats and respond directly on endpoints. Users now can also automatically conduct technical audit of all popular operation systems according to cyber security standards.