Cervais D-RISK® enterprise
Global IoT Device Protection
D-RISK® Enterprise employs some of the most advanced data forensics detection and
monitoring techniques available, using Artificial Intelligence and Machine Learning, to
protect all Internet of Things (IoT) endpoints and devices within an enterprise environment.
This allows security to be proactive, not reactive, in detecting and thwarting cyber-attacks.
- Block Chain
- Continuous Authentication
- Threat Sharing
- Malware Hardening
- Advanced Data Forensics
- Incident Response
Identify, Authenticate and Authorize Devices
Block Chain Technology: Using blockchain technology, D-RISK® Enterprise provides scalable seamless auto-provisioning of IoT devices incorporating identification, authentication and authorization (IA)2.
Continuously Authenticate Users
Continuous Authentication and Predictive Analytics (CAPA): D-RISK® Enterprise incorporates a feature called Continuous Risk-Based Authentication (CRA), which extends user authentication beyond the login event-so that it is now a continuous process.
Adapt to Ever-Changing Threats
e-Sense: D-RISK® Enterprise features D-Sensing technology which coordinates the sharing of real-time threat information externally with other D-RISK® Enterprise communities.
Find Malicious Activity Quickly
Malware Hardening with Advanced Endpoint Protection (AEP): Artificial intelligence runs at the heart of our malware engine to proactively detect and prevent any malicious software from gaining access to any of your system endpoints.
Perform Effective Threat Hunting
Advanced Data Forensics: D-RISK® Enterprise employs the most advanced data forensics detection and monitoring techniques—including real-time events, process initiation, file system changes, and Windows registry alterations.
Detect. Respond. Secure.
Incident Response: D-RISK® Enterprise collects attack-context data as input to incident response intelligence. The D-RISK ® console provides pre-execution insights and detonation intelligence from static analysis, dynamic analysis, and predictive analytics.