Defensys Security Orchestration, Automation & Response Platform (SOAR) represents a comprehensive software platform for security automation and orchestration which can serve as a basis for building a high performing Security Operations Center.
Defensys SOAR aggregates all security incidents data from various sources in a single database for further analysis and investigation and facilitates agile incident response through automated workflows and playbooks.
Incident Response Automation
The platform offers an advanced set of automation tools including dynamic playbooks, a set of ready-to-use scripts, adjustable workflows and security orchestration.
SOC Team Collaboration
Common workspace for team members which ensures easy access to collected evidence and data. Chat, commenting and other built-in communication tools streamline collaboration across teams.
IT Infrastructure Control
Comprehensive insight into the company’s IT infrastructure and related business processes which is delivered by built-in inventory tools and collected from integrated security solutions.
Centralized Data & Evidence Collection
Centralized data, evidence and documents storage facilitates easy access and information sharing among team members and improves compliance with regulatory security standards and guidelines.
Flexibility
Flexible settings for tailoring the platform for your company’s specific environment and needs, including adjustable incident parameters, fully customizable workflows and playbooks, specified access to data and roles, and much more.
Out-of-box Integrations
Built-in integrations with a wide range of commonly adopted security tools and systems. Open API and universal connector via e-mail allow building custom integrations.
Incident Data Sharing
Built-in tools for incident data sharing arrange for collaboration with trusted partners, external experts, communities and public CERTs or SOCs. Real-time data exchange gives companies access to most actual high-quality data facilitating early threats detection.
Performance Tracking & Reporting
Customizable dashboards and reports bring visibility into security operations. Incident metrics make it easy to track performance and identify directions for improvements.
Defensys Security GRC Platform allows the creation of an effective information security system through automated IT-assets and risk management, security audits and compliance control to industry standards and requirements.
Information Security Management
Control tactic and strategic information security plans, keep track on overall cybersecurity performance and status, perform centralized task management and much more.
Risk Assessment & Control
Calculate risks associated with information security by using one of the embedded methodologies or your own. Produce a detailed risk mitigation plan and keep track of its implementation and risk level changes over time.
Audits & Compliance Management
Perform automated audits and compliance checks with industry standards and best practices, calculate compliance index, monitor its changes over time, and enjoy automated generation of reports and essential documents.
Checklists & Task Management
Get a comprehensive checklist of compliance problems that should be resolved with an option to assign the responsible person, specify deadlines, severity level and associated assets and easily track the status of remediation.
Security Level Control
Control the company’s security level trough automated data collection from available security tools and external information systems, leverage centralized storage of all information security documents and data and keep track of implemented security measures.
IT Infrastructure Control
Get a holistic view of the company’s IT infrastructure and security status by using built-in inventory tools and integrations. Control security settings and user privileges and perform vulnerabilities management.
Cybersecurity Awareness Promotion
Reveal employees who are sensitive to phishing attacks, perform their training, run simulation attacks and monitor training progress.
Visualization & Reporting
Enjoy full visibility of security operations through customizable dashboards, diagrams and charts, visual display of relations between information and IT assets and automated generation and delivery of reports. Track performance by using built-in metrics.
Defensys Threat Intelligence Platform facilitates comprehensive management and use of threat intelligence, and also enables centralized collection and prioritization of indicators of compromise, enriched with additional context and direct output of ready-to-use data to security controls and systems.
Collection & Processing
Aggregation of threat intelligence data from multiple sources with automated processing and prioritization.
Correlation & Analysis
Collection of additional information associated with an IOC including TTP reports, vulnerabilities, malware and related IOCs.
Enrichment with context
Additional checks and data enrichment with the necessary context through additional enquiries into external systems and other available data sources.
Monitoring & Detection
Real-time monitoring and detection of IOCs in the infrastructure with automated notification in case of detection.
Delivery & Response
Ready-to-use data is automatically delivered to internal security controls ensuring immediate response and reducing false positives.
Automation
Automation of all repetitive operations with IOCs including collection, enrichment, detection, data output and notifications eliminating manual routine tasks.
Defensys SENSE is a full-featured cybersecurity anomaly detection platform with the following capabilities:
Detecting abnormal system status changes. Identifying suspicious activity.
Assessing threats and anomalies dynamically.
Reliable and scalable architecture
You can easily add all your log sources, data lakes or logs from the current SIEM for the purposes of anomalies detection.
Each entity has its own security score
All the endpoints, servers, users and accounts are constantly monitored and assessed by Defensys Sense.
Machine learning for tracking all the popular infrastructure activities
Defensys programmatic experts will give different suspicious score depending on the type of an anomaly detected.
Defensys Sense never stops studying and assessing your infrastructure
Flexibly customisable schedule helps the System to automatically adjust its detection capabilities especially for the quickly changing infrastructures.
Investigation timeline
You can quickly find out the root cause of each cyber incident when it comes to the investigation phase. You can work with convenient timeline or jump to it from the SOAR.
Defensys Threat Deception Platform is a comprehensive all-in-one tool for digital infrastructure simulation designed to proactively detect and prevent cyberattacks. With a complex combination of lures and traps Defensys TDP detects intruders, delays their progress within the network and ensures the cyberattack mitigation.
Key components of the Deception technology
Defensys TDP consists of traps and lures that are managed from the one user friendly web interface.
Traps of different interaction levels
Defensys offers a wizard like method of traps creation and placement with a rich variety of its types.
Lures that look like real files with some "valuable" data inside
This helps to lead the unauthorised actors to the places where the analyst can decide what to do with such activities. The attacker or malicious code will think that the real servers are penetrated.
Notifications and integrations
All the useful data collected can be sent to the TIP to enrich the IoCs library with the additional crucial context, to the SIEM in addition to other correlated events or directly to the SOAR in the form of a new cyber incident.
Defensys SIEM is the main component for building a cybersecurity center. Provides centralized management of event flows from all information systems, helps to identify incidents in a timely manner and preserve the integrity of the business.
Defensys SEIM architecture
It can be simply scalable and can work with a big amount of data. The System can be integrated with almost any data source.
Any events sources
A convenient data collection component helps to integrate with all the needed sources in the infrastructure.
Data management
The single user friendly interface of the Defensys SIEM enables users to manage different data types the way needed for a future correlation.
Events correlation
Defensys cyber security analysts provide you with a rich library of correlation rules that can be customised to the needs of any organisation.
Data storage and quick search
A high performance database helps to promptly find all the needed context when some critical cyber incidents are needed to be investigated.