TRAPMINE Endpoint Security

TRAPMINE Endpoint Security

TRAPMINE Endpoint Security

杀毒应用, 反恶意软件应用

软件描述

TRAPMINE平台将机器学习、行为监控和漏洞利用防护等经过验证的技术整合于单一代理中,为防范漏洞利用、无文件恶意软件、勒索软件及其他针对性攻击提供无懈可击的防护。

官方网站

访问软件的官方网站了解更多信息

官方认证

trapmine.com

安全链接HTTPS

什么是 TRAPMINE Endpoint Security?

TRAPMINE Platform combines proven technologies such as machine learning, behavior monitoring and exploit prevention techniques in a single agent to provide fool-proof defense against exploit attempts, file-less malware, ransomware and other forms of targeted attacks. EFFECTIVE PREVENTION Traditional security solutions are no longer efficient to protect organizations from attacks by today’s modern cyber threat actors. TRAPMINE uses innovative technologies to prevent the attacks of today and future. Behavior engine to stop malware, lateral movement and file-less attacks. Exploit prevention engine to block user-mode and kernel-mode exploit attacks. ThreatScore machine learning engine to detect known and never-seen-before malware. ZeroGap Cloud Intelligence to detect known malware. DETECT AND RESPOND Powerful live response and forensics features to analyze your endpoints , collect artifacts and hunt hidden threats. Find the root cause of attacks. Get visibility across your organization. Collect forensic artifacts by asking simple questions. Take remote actions and reduce the risk. Simplified Threat Hunting Real-Time Threat Hunting, Live Query, Incident Response ASK SIMPLE QUESTIONS TO INVESTIGATE YOUR ENDPOINTS Security and IT Operation Teams often look for a solution to perform remote investigation, remediation and threat hunting. This is why TRAPMINE Hunter is a tool of choice for Security and IT Operations Teams, Incident Response Specialists and Threat Hunters. Discover Active Processes Installed Applications Installed Drivers Powershell History Evaluation & Analysis Process Reputation by ZeroGap Process Machine-Learning Score by ThreatScore Proces Malware Scan Memory Scan for Hidden Threats Discover Persistence Objects OS Startup Entries (Registry, file etc.) Scheduled Tasks WMI Auto-runs & Infections Respond & Remediation Registry Scan File System Search Active Mutex and Objects Process Memory Dump Kill, Block and Delete Action