CloudCyte

Holistic Threat Hunting for Stealth Cyber Attacks

CLICK TO SECURE YOUR WORKFORCE

Free Phishing Attack Simulator

CloudCyte provides a new layer of asset attack surface management and threat hunting framework for identifying and blocking the hidden cyber threats living in stealth mode before compromising the infrastructure. The platform monitors every communication for complete protection from end-users, data centers, cloud platforms, e-mail applications and OT devices to block any unverified communication attempt or the device inside the network.

The platform allows organizations and MSSP’s to deploy the solution on premise or any cloud platform in minutes. All components of CloudCyte are based on virtualized containers enabling scalability without requiring complex resource planning. The system offers two modules for complete protection of communication inside the IT infrastructure.

Holistic Threat Hunting for Stealth Cyber Attacks
CloudCyte provides free phishing attack simulator up-to 250 users and free trial of all features for thirty days.

Main Features

Threat hunting for e-mail, endpoint, datacenter, OT, and cloud activity.
Asset attack surface management for a new level of threat visibility.
Block malicious connections and uncompliant devices for a swift response.

Threat Hunter

CloudCyte Threat Hunter creates a neural map of how information flows within an organization to applications running on end-points and servers. The neural map provides a library for communication patterns of how applications and OT devices communicate to detect abnormal activity. The module also acts as an integration hub for existing security solutions to enable threat investigation and blocking any malicious communication.
Main Features
Z
Support SOC teams by providing more detailed information on possible threats and reducing the noise from excessive security alerts.
Z
Avoid cyber breaches by enabling faster investigation and analysis of possible threats by aggregating, normalizing, and mapping the infrastructure’s activity within a neural map to minimize false positives.
Z
Achieve better compliance by identifying, managing, and reducing the cyber risk by creating 360° visibility for critical IT & OT assets.
Z
Track behavioral changes in communication patterns of applications.
Z
Identify and block any unidentifiable communication from end-points, servers, cloud platforms, and OT devices.
Z
Normalize, relate and enrich activity detected from Firewalls, EDR’s and other threat analysis solutions to minimize noise and identify threats.
Z
Act as an integration hub for existing security solutions to enable threat investigation and block any malicious communication.
Z
Block malicious and any unknown communication without impacting the business operations for zero-trust access control.

E-mail Security

The module is a GDPR compliant e-mail phishing detection and inbox security solution. The system enables organizations to identify and delete malicious e-mails bypassing the security controls.

The users can report e-mails that they suspect are suspicious. The platform provides unmatched visibility for malicious e-mails reaching the end-users. Once an e-mail is identified as malicious, the system can trigger an investigation. The investigation process enables the discovery of risky e-mails without requiring mailbox access. Once an e-mail is identified as malicious, the e-mail can be deleted from all user mailboxes.

Main Features
Z
Identification of targeted phishing attacks bypassing the existing security controls.
Z
Enable automated actions for malicious e-mails.
Z
GDPR compliance by performing analysis based on the metadata collected from the e-mails.
Z
Increased user awareness.

CloudCyte for MSSP’s

White-labelling support for all components to enable better MSSP brand visibility.

Deployment on any Kubernetes supporting cloud platform including Amazon WS, Microsoft Azure and Google.

Ability to enroll and initiate customers in minutes.

Full support for self-management and customer tracking.

Enable self-deployment for zero maintenance overhead.

Threat Hunter Platform Support

Granular identification of traffic created by applications with or without agents.
– Windows
– Linux/Unix
Support for different data collection methods.
– DNS Span (Microsoft DNS, Bind)
– DNS Relay
– Netflow / Sflow
– Port Span
– SSH
– Perimeter Security Devices
– Network Devices
– EDRs
Support for different methods for blocking malicious communication:
– DNS Relay
– Perimeter Security Devices
– Network Devices
– EDRs
– Agent

E-Mail Security Platform Support

Agentless e-mail add-in for Microsoft Outlook (Windows, MAC OS, IOS, and Android)
– Microsoft Exchange Server 2016 +
– Microsoft Office 365
Agent based add-in for Microsoft Outlook for Windows 2016 +
E-Mail Plug-In for Google Mail
Would you like to learn more about how to protect your business?

We're member of

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.