100% Signatureless Protection For All Software

Attack Vector Targeting
DeepSentry ingests machine data like application logs, service logs, statuses of active processes, network usage statistics, disk usage statistics, web login attempts, actual binary dumps of your software, etc. into an application-system data profiler that performs application-level data profiling and system-level data profiling to create a complete picture of your endpoints.
A fuzzy logic classification system automatically generates relevant contexts surrounding possible attack vectors which hackers, exploits and malware, depend on inside your network to launch their attacks.
The standards of the Linux/BSD which are used on most of the computers owned by businesses in the world form the baseline of predictive security analytics with additional data points taken from network protocols and application diagnostics (from the machine data on the endpoint).

Eliminates Every Stage Of Advanced Persistent Threats

Infiltration Attack Prevention
Threat actors identify targets for collection and assess entities relationships for exploitation in attacks
Typically crafted spear phishing emails with linked or embedded files containing malicious code serve as the intrusion attack vector

Network Attack Prevention
Escalate Privileges
Manipulate existing access control lists and application control rules used by user-group accounts inside the operating system of the endpoint
Install Utilities
Attackers install new utilities necessary to maintain persistence and further compromise the endpoint and its network
Enumerate the Network
Attackers collect valid credentials to gain unauthorized access to additional nodes of networks connected to the compromised endpoint
Establish Backdoors
Attackers modify valid credentials, access control lists and application control rules, to change ownership of entire networks and to create forward operating bases for stealing valuable data

Exfiltration Attack Prevention
Conceal Activity
Attackers attempt to clean up the installation of their tools, overwrite security logs and hide established backdoors
Harvest Data
Attackers copy valuable data, targeted documents and specific emails, to encrypted packages which are password protected
Masquerade Source
Attackers move encrypted packages to nodes within their command and control infrastructure through behaviors which appear like legitimate activity

100% Protection For All Software

Intelligent Endpoint Protection
State of the art, next generation endpoint protection ensures programs behave the way you want them
Deep Relational Reinforcement Learning to learn the full scope of your software functionality from the machine data on the endpoint
Predictive Security Analytics about threats emerging in your network
Security Orchestration, Automation & Response (SOAR) to respond to unknown behaviors or abnormal behaviors which could compromise the security of your endpoint

Complete Picture Of Your Endpoints

Predictive Security Analytics
Raw numerical details of relational reinforcement learning used to calculate confidence, credibility, relevance, logic, etc.
Raw numerical details of RRL & PCA used to predict most likely behaviors
An interpretive analysis of the predictive security analytics like probable series of behaviors in this moment based on predictions, activity determined to be of imminent threat, a list of specific activities determined to be of imminent threat, activity determined to be of normal activity based on historical data, activity determined to be of normal activity based on predictions, etc.

Get started with a free, no contract 30-day trial you can use to configure training, enforce learning, and receive reports

Get Started

Security Orchestration, Automation and Response (SOAR)

Automated Custom Strikes
Use the automation tools you're familiar with, installed on an endpoint in your network, so you're in total control of the strikes deployed on your endpoints: Bash, Python, Expect, Ansible, Puppet, Chef, Vagrant, Awscli, Gsutil, etc.
See our examples in the documentation to orchestrate the spin up and shutdown of emergency services. Add a script that creates a snapshot of important directories on your endpoint then detaches the hard drives connected to your endpoint, maybe the script switches the power off on the endpoint too.
Issue GET requests to Predictive Security Analytics for the latest predictions based on the activities on your endpoint
Use the Builtin Access Key to dynamically reconfigure DeepSentry resources
Issue requests to third-party REST-API providers
Set added entries to false to disable strikes

Programmable Security Architecture

See online documentation for complete, step by step examples
HATEOAS Compliance — Follow hypermedia links in responses to configure appropriate resources
Multi-Factor Authentication (MFA) — TLS Certificates, Endpoint Aliases, FQDN Source Matching, IP Source Matching, 36-Bit UUID Access Keys, SSH2 4096-Bit Keys
Cloud Agnostic — AWS, GCP, XenServer, VMware, or your data center
Storage Agnostic — AWS, GCP, Splunk, Wget, Curl, SSH SCP, upload local files, or website URLs