empow’s security platform radically upends traditional approaches by integrating with your existing network infrastructure and breaking down your security tools into their individual components – what we call Security Particles™. This creates a taxonomy of security functions that mirrors advanced attack kill-chain models, and enables modeling targeted defense strategies. Sitting atop of your existing security configuration, the empow Security Platform then executes these defense strategies throughout the network, coordinating optimal detection, investigation and response according to each defense strategy in place. Now you will know that your security is tackling attacks in the right way, every single time, and turning what you have into what you need.
Each Security Application represents a smart orchestration model that protects against a threat scenario or attack campaign. Each app includes detection, investigation and decision workflows that strategically assemble different security particles, integrating the most appropriate and effective capabilities from the network . Leveraging the abstracted language of intent makes the Apps strategic, vendor-agnostic, and adaptive in activating the underlying infrastructure of security products and network devices.
The empow Platform collects and analyzes logs, data and intelligence feeds from existing security products, domain controllers and servers, using a range of plugins for third-party network and end point solutions. If needed, new plugins specific to the customer’s needs can be developed by empow’s Professional Services team within days, and easily-configured custom data sources may be added.
empow’s Security Platform deciphers the intent of each collected log, using machine learning and Natural Language Processing (NLP) algorithms. The algorithms emulate the actions done today by the Security Analyst: deciphering the logs, seeking out relevant information from the log itself and from third party data sources outside the organization, and identifying the attack intent. If the attack intent is a threat according to the organization’s defense strategy (Security App), then it advances to the next stage - cause and effect analytics. This process runs continuously and automatically, with zero human involvement.
The security analytics engine identifies cause-and-effect relationships between the collection of deciphered intents, grouping them together and creating a visual attack story. This engine also emulates human security expert processes, decides in real-time which investigation policies are required, and according to its internal risk assessment capabilities, decides which proactive response policies to employ. These are then dynamically executed in the network. The investigation and response policies are dictated by the Security App.
empow’s Contextual Orchestration Engine dynamically identifies the required investigation and response actions, and selects the best available products and network tools to execute them . This translates into fast and optimal incident response, while at the same time simplifying security operations and eliminating maintenance overhead.
Detects and mitigates targeted intrusion attempts and personally identifiable information leaks.
Identifies and blocks campaigns that try to break into data services that store sensitive information and encrypt it for ransom purposes.
Identifies and mitigates abnormal behavior and malicious user activities.
Identifies and blocks campaigns that try to gain admin privileges in order to conduct a range of attack types on the organization.
Mitigates e-mail spoofing fraud campaigns targeted at individual users, resulting in confidential user information theft and more.
A generic application that identifies and mitigates against intelligence gathering attack vectors, including incidents that can evolve into actual attacks.
The empow Security Platform provides advanced threat analytics and security system diagnostics. The Platform includes Threat Analytics monitoring and reports that cover the different threats targeting the organization – providing threat management visibility into the organization’s security posture.
The empow Security Platform enables a detailed Security Diagnostics Service that provides fact-based analysis of the security apparatus and security tools, effectiveness against threat scenarios and compliance models.
We’ll show you how we can quickly and economically
turn what you have into what you need.