Cervais D-RISK® enterprise

Global IoT Device Protection

D-RISK® Enterprise employs some of the most advanced data forensics detection and

monitoring techniques available, using Artificial Intelligence and Machine Learning, to

protect all Internet of Things (IoT) endpoints and devices within an enterprise environment.

This allows security to be proactive, not reactive, in detecting and thwarting cyber-attacks.

 

Ask for a DemoLearn More

Decrease Your Threat Landscape with Predictive Analytics

The Cervais D-RISK platform is built around a modeling framework that employs the Continuous Authentication and Predictive Analytics (CAPA) engine-the core of which manages an extensive array of machine learning algorithms. With CAPA, our cybersecurity tools apply predictive analytics to enforce and detect anomalies from all inbound attack vectors—and neutralize any threats.

Proactive, Aggressive IoT Security

D-RISK® Enterprise offers real-time identification and reporting of events including process initiation, file system changes, and threats from all in-bound attack vectors. Reporting comes through alerts to designated communications outlets, but also through the easy to administer, comprehensive D-Risk Enterprise dashboard. The dashboard enables the user to easily identify trends in attacks, to drill down into the specifics of particular attacks on particular assets or groups of assets, to locate and view the geolocation of protected assets and many more functions.

Using blockchain technology, D-RISK® Enterprise provides scalable seam-less auto-provisioning of IoT devices incorporating identification, authentication and authorization (IA²). D-RISK® Enterprise works with todays common operating systems but also supports older and legacy operating systems such as Win95, Win98, WinXP, etc. and all Linux versions.

D-RISK® Enterprise can also be used in conjunction with D-RISK® Mobile Data Protector as a management platform to provide maximum flexibility and coverage of all types of devices in locations around the world.

D-RISK® Enterprise

Identify, Authenticate and Authorize Devices

Block Chain Technology: Using blockchain technology, D-RISK® Enterprise provides scalable seamless auto-provisioning of IoT devices incorporating identification, authentication and authorization (IA)2.

Continuously Authenticate Users

Continuous Authentication and Predictive Analytics (CAPA): D-RISK® Enterprise incorporates a feature called Continuous Risk-Based Authentication (CRA), which extends user authentication beyond the login event-so that it is now a continuous process.

Adapt to Ever-Changing Threats

e-Sense: D-RISK® Enterprise features D-Sensing technology which coordinates the sharing of real-time threat information externally with other D-RISK® Enterprise communities.

Find Malicious Activity Quickly

Malware Hardening with Advanced Endpoint Protection (AEP): Artificial intelligence runs at the heart of our malware engine to proactively detect and prevent any malicious software from gaining access to any of your system endpoints.

Perform Effective Threat Hunting

Advanced Data Forensics: D-RISK® Enterprise employs the most advanced data forensics detection and monitoring techniques—including real-time events, process initiation, file system changes, and Windows registry alterations.

Detect. Respond. Secure.

Incident Response: D-RISK® Enterprise collects attack-context data as input to incident response intelligence. The D-RISK ® console provides pre-execution insights and detonation intelligence from static analysis, dynamic analysis, and predictive analytics.