Network and User Security

Combining network and user security with other Cynet protections form a multi-layered defense strategy that addresses multiple attack vectors. This holistic approach is crucial for effectively mitigating threats and protecting organizational assets.

Network Protection

Cynet detects stealthy threats and anomalous behaviors across your network, analyzing interactions with devices and users to provide high fidelity threat detection. Network signals are combined with other Cynet native telemetry for unparalleled threat visibility and detection accuracy.

Network Protection

Network Detection and Response (NDR)

Cynet network detection and response discovers and eliminates otherwise invisible threats.

Network Scan Detection
Identify patterns of activity indicative of malicious network scanning activity
DNS Attack Detection
Identify a variety of attacks targeting the DNS infrastructure
Deception
Deploy decoy hosts and servers, and monitor for unauthorized access
Tunnel Exfiltration Detection
Protect against exfiltration of sensitive data even through encrypted communication pathways
Risky Connection Detection
Identify active communication with malicious sites to protect against malware distribution, phishing, and known C2C based communication
Port Scanning
Identify vulnerable ports and suspicious port scanning activities to minimize the risk of adversary exploitation

User Protection

Cynet continuously monitors user activity to pinpoint suspicious behaviors that are indicative of compromised accounts and malicious insiders.  User behavior signals are combined with other Cynet native telemetry for unparalleled threat visibility and detection accuracy. 

User Behavior Analytics

User Behavior Analytics (UBA)

Cynet UBA monitors user behavior to spot and isolate compromised accounts.

User Threat Level
Continuously correlate user activities against other events — on endpoints, files and external network locations — to provide holistic information to determine real-time risk levels
Real Time Activity Context
Continuously correlates user activities against other events — such as endpoints, files and external network locations — to determine real-time risk levels
Malicious User Identification
Rapidly detect suspicious user activities such as lateral movement, C&C activity, accessing bad domains, etc.
Lateral Movement Detection
Detect the use of compromised credentials accessing network assets
Deception
Deploy decoy users and monitor for unauthorized access.
User Visibility
Visibility into all user activity and login events
Anomaly Detection
Detect abnormal user behaviors such as lateral movement, C&C activity, accessing bad domains, etc.
Domain Filtering

Domain Filtering

Cynet Domain Filtering restricts access to specific domains to prevent users from accessing harmful or inappropriate content. For example, if a user clicks a malicious link from their desktop the attempted connection would be stopped.

Cynet Domain Filtering prevents endpoints from connecting to malicious or compromised websites.
Monitor all Windows-based endpoint browsers and processes regardless of endpoint location or connection (in/outside the corporate firewall)
Detect or prevent malicious connections (configurable)
Protection across all browsers and network protocols (ex., HTTP, HTTPS, TCP)
Whitelisted domains and alerts are configurable.

Let’s get started!

Ready to extend visibility, threat detection and response?

Get a Demo

Search results for: