
2. Detection
Our continuously improving and dynamic detection product leverages next-generation Endpoint Detection and Response software. Detection occurs through conventional virus signature confirmation, and more importantly, behavior that is mapped to the MITRE ATT&CK™ knowledge base, and public and private threat intelligence feeds.

4. Response
Automated Incident Response activities are a common start in quarantining and deleting suspicious files. However, a more robust Incident Response action can more accurately be performed by human intervention. Too often automated fixes give us a false sense of comfort. Our resident agents provide an automated action, reducing the mean time to remediate, collecting forensic data to be leveraged to strengthen ongoing defenses by understanding the full scope of attacks.

