Percept XDR - Datasheet - 21

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

PERCEPT

Cloud Security
Platform

Sequretek is a global cybersecurity company. We offer end-to-


end security in the areas of enterprise threat monitoring,
incident response, device security, identity & access governance
through our own AI driven Percept Cloud Security Platform.

www.sequretek.com [email protected]
PERCEPT EDR PERCEPT XDR PERCEPT IGA
Endpoint Extended Identity
Detection & Detection & Governance &
Response Response Administration

PERCEPT Cloud Security Platform

Endpoints Servers Containers Network VMs Cloud Applications Databases

Take Control of your enterprise security

▪ Enterprise scale, easy to use and cloud


native

▪ AI driven threat detection, protection,


remediation and response

▪ Quick implementation and


integration capabilities

▪ End-to-end ownership and


management of Sequretek products

▪ Reduce Total Cost of Ownership (TCO)


while simplifying security

www.sequretek.com [email protected]
PERCEPT XDR
AI based turnkey solution for end-to-end enterprise security monitoring, threat
detection and incident response for clouds and on-premise enterprise environments

Vaccine for Complete Enterprise Security


Percept XDR cloud platform provides end-to-end security, allowing enterprises
to focus on their growth without the fear of any compromise. It offers a
combination of Artificial Intelligence (AI) based threat detection and incident
response technology. The platform provides 24/7 visibility, intelligence,
detection, and response against new generation threats, malware, user and
entity behavior for all enterprise security data, telemetry and events.

Key Benefits
Deep Learning AI based Detection
Cloud Native Deep learning is used for correlation and attack
identification, powering Percept XDR to detect APTs and
24 x 7 Enterprise- wide targeted attacks. The deep learning detection engine self-
security monitoring & learns to identify new use cases and anomalies which
response enhances detection capabilities.

Protect against
phishing, ransomware,
exploits, insider threats,
and more

Security visibility & Big Data Security Analytics


coverage across
All data sources Percept XDR leverages Big data to process data features
and detect various associations including Attack Kill Chain
Quick implementation Association, Insider Threat Enrichment as well as Time
in less than 2 weeks Series Analysis for Threat Hunting and APT

Security Analytics
Workbench

Minimum intervention
and pre-requisites from
client’s IT Team
SOAR ML Based Automated Response

Integration with 3rd Percept XDR features SOAR-based automated response in


party applications line with the MITRE ATT&CK framework. The reduced
number of incidents that require manual intervention
Incident and case allows enterprise IT teams to focus on the core objectives.
management tools

www.sequretek.com [email protected]
Correlation and Incident Threat
Monitoring Detection Response Hunting

AI: Security Big


Data Analytics

24/7 x 365 AI based SOAR AI based Proactive threat


Monitoring Correlation response identification
Enterprise Security
Dashboard
Sensor Threat and Malware, SOPs for Advisories
Telemetry and User and Entity threat and
Logs Behavior Detection Containment new SOPs

Comprehensive AI based Automation MITRE ATT&CK


Threat Insight and Device and Cloud Incident based on risk based
Intelligence Coverage detection categorization mapping

Security Visibility Across Threat and Malware User Behavior and


ALL DATA SOURCES Intelligence Entity Anomalies
Our robust connector AI trained with hundreds of AI trained with hundreds of use
framework along with use cases including phishing, cases including insider threats,
RESTful API integration ransomware, malware, attack user login failures, simultaneous
offers the flexibility to build kill chain identification, web login attempts from multiple
and include new devices, attacks, local modifications locations, abuse of privileges,
data logs and telemetry after malware download, brute force attacks, logs
sources. This ensures full communications and data tampering, compromised user
coverage for your exchange with TOR, accounts, unauthorized
enterprise as you grow and Blacklisted IP, Vulnerability configuration changes in critical
add new IT environments. exploit scan and more devices and many more

Security Dashboards Global Threat


and Reporting Intelligence
It helps enterprises to have Percept XDR leverages the
a single pane of glass for Sequretek Central Threat
enterprise security by Intelligence framework for real-
generating CISO dashboards time global threat intelligence.
in addition to daily, weekly Industry-specific and global
and monthly reports while threat scenarios are used to
ensuring compliance prevent likely attacks

www.sequretek.com [email protected]
Take Control of Your Security
To know more about our products email us at [email protected]
or visit our website: www.sequretek.com

© 2021 Sequretek. All rights Reserved

You might also like