Advanced Persistent Threat Scanner (APT-Scanner) – SECUINFRA

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)SECUINFRA GmbH
Websitehttp://www.secuinfra.com
Company size (employees)10 to 49
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

DAMAGE MINIMIZATION
Prevent major damage by detecting compromised systems at an early stage. SECUINFRA cyber defense experts have been searching for and finding compromised systems on a daily basis since 2017 and can help minimize damage.

RELIABILITY
Play it safe and let our SECUINFRA cyber defense experts regularly scan your most critical systems for indicators of compromise (IOCs). We can reliably find compromised systems in your infrastructure.

EFFICIENCY
APT scanners are by far the most reliable and efficient technology for detecting compromised IT systems. Increase your cyber resilience through the reliability of APT scanners and cut costs due to the technology’s efficiency.

Brief Overview

Unlike conventional antivirus software, an APT scanner doesn’t look for fragments of malicious code, but for traces of an attack – indicators of compromise (IOCs) – like in a forensic examination.

To do this, the APT scanner uses a set of rules containing the IOCs.

This set of rules is applied to various artifacts in a system (files, folder structures, running processes, RAM content, log data, etc.) to look for traces of previous and ongoing cyber attacks.

Thanks to international cooperation in the cyber defense community, new cyber attacks are constantly being analyzed. The IOCs then derived are saved as new rules in the APT scanner.

This ensures that an APT scanner becomes ever more precise over time and, unlike conventional antivirus software, has an extremely high detection rate for compromised systems.

During a cyber attack, attackers or an APT group use various tools and techniques to achieve their goals. They inevitably leave detectable traces in the compromised systems. While smart attackers can cover their tracks to some degree, they can’t remove absolutely all traces of their presence!

Indicators of compromise (IOCs) can be derived by analyzing compromised IT systems and collecting evidence.

These IOCs are added to the set of rules for the APT scanner and are used in future scans.

The APT scanner can very efficiently detect attackers using similar tools and techniques and, in doing so, substantially speed up the complex forensic investigation.

  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations