Context-aware &
Intelligence-driven
zero Hype | zero FALSE POSITIVES | zero Excuses
Advanced
Network
Threat Detection
Threat Detection
Advanced Endpoint
Threat Detection
& Response
Threat Detection
& Response
Deception
Technology Everywhere
Technology Everywhere
Behavior
Analytics,
Incident Forensics & Breach Response
Incident Forensics & Breach Response
Crowd-Sourced
Threat Intelligence
Threat Intelligence
Deep &
Dark
Web Intelligence
Web Intelligence
LMNTRIX®
Active Defense
Active Defense
.01
The LMNTRIX Active Defense is a validated and integrated threat detection and response architecture that hunts down and eliminates the advanced and unknown
threats that routinely bypass perimeter controls.
.02
We use a combination of advanced network and endpoint threat
detection, deceptions everywhere, analytics and global threat intelligence technology complemented with
continuous monitoring and both internal and external threat hunting.
.03
This “no stone left unturned” approach means our clients gain a
fully-managed, security analyst-delivered service that defends against zero-day attacks and advanced
persistent threats 24 hours a day, 7 days a week
LMNTRIX®
Respond
Respond
The LMNTRIX Respond service uses a light weight sensor
deployed on all your endpoints to capture detailed state information and it is used by our Cyber Defense
Centre to continuously monitor all endpoint activity, conduct adversary hunting, validate breaches and
detect encrypted attacks. Using a light weight sensor our intrusion analysts delve deep into the inner
workings of endpoints and expose anomalous behaviors.
LMNTRIX®
Deceive
Deceive
LMNTRIX Deceive enshrouds your entire network – from every
endpoint to every server and network component – in a deceptive parallel universe. From the instant an
attacker penetrates your network, all they can see is an elusive mirage where every single data packet is
unreliable.
.01
This deceptive environment immobilizes attackers as they are unable to
make decisions if the data they’ve gathered is unreliable.
.02
Additionally, the alternate reality weaved around your network reduces
the number of false positive alerts as only attackers would interact with the false environment. The moment
an attacker acts on false information, they are instantly detected.
.03
LMNTRIX®
Recon
Recon
It’s not enough to know what's happening on the inside of your network,
you need to have someone who has your back on the outside too. After all, when hackers steal data, it almost
always finds its way to an online black market – the deep and dark web. The back alley of the
cyberworld where illegally obtained data is bought and sold.
LMNTRX shines a light on the deep and dark web by using our intelligence, knowledge and proprietary techniques to your advantage. Whether an attacker has stolen your data and is looking to sell it online or if someone is planning to breach your organization and is seeking advice on how to do so, we can use the attacker’s platforms against them so you can be certain of your defenses.
LMNTRX shines a light on the deep and dark web by using our intelligence, knowledge and proprietary techniques to your advantage. Whether an attacker has stolen your data and is looking to sell it online or if someone is planning to breach your organization and is seeking advice on how to do so, we can use the attacker’s platforms against them so you can be certain of your defenses.
LMNTRIX®
ThinkGrid
ThinkGrid
An optional extra, LMNTRIX ThinkGrid is a sophisticated, developer-friendly query language covering structured, unstructured, and time-series data. It is
the perfect replacement for SIEM as it uses an open source search and analytics engine enabling scalability,
reliance and extremely simple management.
Continuous
Monitoring, Hunting & Response
Monitoring, Hunting & Response
A global network of cyber defense centers with highly trained and
certified intrusion analysts who provide constant vigilance and on-demand analysis of your networks. Our
intrusion analysts monitor your networks and endpoints 24x7, applying the latest intelligence and
proprietary methodologies to look for signs of compromise. When a potential compromise is detected, the team
performs an in-depth analysis on affected systems to confirm the breach.