CloudCyte

Holistic Threat Hunting for Stealth Cyber Attacks

CLICK TO SECURE YOUR WORKFORCE

Agentless Collection of Artifacts Like Sysmon and Autoruns 

CloudCyte is an MDR platform for threat-hunting and asset attack surface management to identify cyber risks faster and easier through a zero-trust model. The system provides a unified risk scoring framework for the asset, information, and forensics artifacts. Malicious traffic, uncompliant artifacts, and unknown activity not detected by the existing security controls are identified in hours through gap analysis.

The platform also monitors every communication for complete protection from end-users, data centers, cloud platforms, e-mail applications, and OT devices to block any unverified communication attempt or the device inside the network.

The platform allows organizations and MSSPs to deploy the solution on-premise or on any cloud platform in minutes. All components of CloudCyte are based on virtualized containers enabling scalability without requiring complex resource planning. The system offers two modules to protect communication inside the IT infrastructure.

Holistic Threat Hunting for Stealth Cyber Attacks
CloudCyte provides free phishing attack simulator up-to 250 users and free trial of all features for thirty days.

Threat Hunter

CloudCyte Threat Hunter performs the collection of forensics artifacts from endpoints and the network. After collection, the system creates a neural map of how information flows within an organization. The neural map provides a library for forensics artifacts and communication patterns of how applications and OT devices communicate to discover malicious activity. The module also acts as an integration hub for existing security solutions.

Main Features
Z

Support SOC teams by providing a single classification and risk scoring framework to reduce the noise from excessive security alerts.

Z

Enable the discovery of unknown forensics artifacts and gap analysis to identify malicious and uncompliant activity.

Z

Enable forensics analysis, investigations, and automated remediation without requiring agents from endpoints, networks, and e-mail/Microsoft Teams activity.

Z

Create a neural map of how information flows within an organization enabling drill-down analysis down to applications running in endpoints and servers.

Z

Provide a library of communication patterns of how applications and OT devices communicate, enabling the detection of any abnormal activity.

Z

Act as an integration hub for existing security solutions to enable threat investigation and block malicious communication.

Z

Enable zero-trust access control by blocking any uncategorized traffic or network access of a device.

E-mail Security

The module is a GDPR-compliant e-mail phishing detection and inbox security solution. The system enables organizations to identify and delete malicious e-mails and Microsoft Teams communication bypassing the security controls.

The users can report e-mails that they suspect are suspicious. The platform provides unmatched visibility for malicious e-mails reaching the end-users. Once an e-mail is identified as malicious, the system can trigger an investigation. The investigation process enables the discovery of risky e-mails without requiring mailbox access. Once an e-mail is identified as malicious, the e-mail can be deleted from all user mailboxes. 

Main Features
Z
Identification of targeted phishing attacks bypassing the existing security controls.
Z
Enable automated actions for malicious e-mails.
Z
GDPR compliance by performing analysis based on the metadata collected from the e-mails.
Z
Increased user awareness.
Z
File and content search within e-mail and Microsoft Teams activity.

CloudCyte for MSSP’s

White-labelling support for all components to enable better MSSP brand visibility.

Deployment on any Kubernetes supporting cloud platform including Amazon WS, Microsoft Azure and Google.

Ability to enroll and initiate customers in minutes.

Full support for self-management and customer tracking.

Enable self-deployment for zero maintenance overhead.

Threat Hunter Platform Support

Granular identification of traffic created by applications with or without agents.
– Agent/Agentless for Windows
– Agentless for Linux/Unix

Support for different data collection methods.
– DNS Span and Relay (Microsoft DNS, Bind)
– Netflow / Sflow
– Port Span
– Perimeter Security Devices
– Network Devices

Support for different methods for blocking malicious communication:
– DNS Relay
– Perimeter Security Devices
– Network Devices
– Agent

E-Mail Security Platform Support

Agentless e-mail add-in for Microsoft Outlook (Windows, MAC OS, IOS, and Android) and Teams
– Microsoft Exchange Server 2016 +
– Microsoft Office 365

Agent based add-in for Microsoft Outlook for Windows 2016 +

Microsoft 365

Would you like to learn more about how to protect your business?

We're member of

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.