empow’s security platform radically upends traditional approaches by integrating with your existing network infrastructure and breaking down your security tools into their individual components – what we call Security Particles™. This creates a taxonomy of security functions that mirrors advanced attack kill-chain models, and enables modeling targeted defense strategies. Sitting atop of your existing security configuration, the empow Security Platform then executes these defense strategies throughout the network, coordinating optimal detection, investigation and response according to each defense strategy in place. Now you will know that your security is tackling attacks in the right way, every single time, and turning what you have into what you need.
empow provides a strategic, vendor agnostic, intent-based security language – which allows customizing, or using pre-built targeted defense strategies (Security Apps). The intent-based security language mirrors advanced attack kill-chain models, the taxonomy of attackers’ tactics, techniques and procedures; and is further extended with community terms. To model targeted defense strategies, the empow security language is made up of Security Particles that include detection, investigation and response functions to counter attack missions.
empow’s adaptive security platform sits on top of the network infrastructure and actualizes the intent-based security language by translating targeted defense strategies (Security Apps) into coordination instructions for detection, investigation and response according to each Security App. The Platform effectively implements and executes these throughout the organization’s existing security tools and network infrastructure, while continuously measuring the security system and the effectiveness of its tools.
empow’s solution is made possible by empow’s proprietary AI technologies, which are strategically integrated into the following process:
Each Security Application represents a smart orchestration model that protects against a threat scenario or attack campaign. Each app includes detection, investigation and decision workflows that strategically assemble different security particles, integrating the most appropriate and effective capabilities from the network . Leveraging the abstracted language of intent makes the Apps strategic, vendor-agnostic, and adaptive in activating the underlying infrastructure of security products and network devices.
The empow Platform collects and analyzes logs, data and intelligence feeds from existing security products, domain controllers and servers, using a range of plugins for third-party network and end point solutions. If needed, new plugins specific to the customer’s needs can be developed by empow’s Professional Services team within days, and easily-configured custom data sources may be added.
empow’s Security Platform deciphers the intent of each collected log, using machine learning and Natural Language Processing (NLP) algorithms. The algorithms emulate the actions done today by the Security Analyst: deciphering the logs, seeking out relevant information from the log itself and from third party data sources outside the organization, and identifying the attack intent. If the attack intent is a threat according to the organization’s defense strategy (Security App), then it advances to the next stage – cause and effect analytics. This process runs continuously and automatically, with zero human involvement.
The security analytics engine identifies cause-and-effect relationships between the collection of deciphered intents, grouping them together and creating a visual attack story. This engine also emulates human security expert processes, decides in real-time which investigation policies are required, and according to its internal risk assessment capabilities, decides which proactive response policies to employ. These are then dynamically executed in the network. The investigation and response policies are dictated by the Security App.
empow’s Contextual Orchestration Engine dynamically identifies the required investigation and response actions, and selects the best available products and network tools to execute them . This translates into fast and optimal incident response, while at the same time simplifying security operations and eliminating maintenance overhead.
Our security platform has predefined security applications, all of which are customizable.
Identifies and blocks campaigns that try to gain admin privileges in order to conduct a range of attack types on the organization.
Mitigates e-mail spoofing fraud campaigns targeted at individual users, resulting in confidential user information theft and more.
A generic application that identifies and mitigates against intelligence gathering attack vectors, including incidents that can evolve into actual attacks.
Detects and mitigates targeted intrusion attempts and personally identifiable information leaks.
Identifies and blocks campaigns that try to break into data services that store sensitive information and encrypt it for ransom purposes.
Identifies and mitigates abnormal behavior and malicious user activities.
empow recognizes that your team’s skills are an essential component
of your overall security.
That’s why our platform is built to leverage your skills and requirements to create new security applications. Your security experts can easily build apps using a guided UI process where they select the security service and security functions, as well as workflows that will integrate detection, investigation and mitigation behaviors. Once built by your team, these apps become part of the tool-set that empow abstracts and orchestrates.
empow Network Traffic Behavioral Analysis Service
empow’s solution comes with an out of the box adaptive behavioral analysis service that adds visibility to your internal network’s traffic and detects unknown threats in it. Based on empow’s network DPI software engines, the network traffic analytics service learns and profiles the normal patterns of behavior of users and servers inside the network, and identifies behavior anomalies that can be associated with various threat categories.
Threat Analytics Reporting
and Security Diagnostics
The empow Security Platform provides advanced threat analytics and security system diagnostics. The Platform includes Threat Analytics monitoring and reports that cover the different threats targeting the organization – providing threat management visibility into the organization’s security posture.
The empow Security Platform enables a detailed Security Diagnostics Servicethat provides fact-based analysis of the security apparatus and security tools, effectiveness against threat scenarios and compliance models.
We’ll show you how we can quickly and economically
turn what you have into what you need.