
Managed Detection and Response (MDR) & Network Detection and Response (NDR)
SECNAP’s CloudJacketXi NDR and MDR comprise a security-as-a-service solution that manages, detects, and responds to ongoing cybersecurity threats. CloudJacketXi
Our technology, in combination with our SOC, eliminates labor intensive log analysis and alert fatigue allowing your IT resources to focus on your actual business needs.
On-Premises • Cloud-Delivered • Virtual • Hybrid
Prevent Breaches in Real-Time
Our flexible security-as-a-service platform follows a layered approach, so we can place protections exactly where they’re needed, and stop threats now. Compared to an EDR only solution, the strengths of SECNAP‘s MDR, NDR, and perimeter security ensures that even the latest threats are not missed.
Intrusion Prevention System (IPS):
An Intrusion Prevention System (IPS) typically deployed in-line between a gateway and core switch. The in-line sensor performs real-time deep packet inspection to identify anomalous network activity. Traffic crossing the IPS sensor deemed to be potentially malicious is blocked. Event data is transmitted to, analyzed by, and displayed on the CloudJacketXi Platform.
Internal Threat Detection (ITD):
Utilizes deceptive security to identify potentially hostile threat actors operating inside of an internal network. The ITD sensor monitors access to simulated network services and filesystems to identify unauthorized access.
Lateral Threat Detection (LTD):
Receives data (up to 1Gbps) from a switchport configured to use Switched Port Analyzer (SPAN), also referred to as Port Mirroring, to provide additional visibility into network traffic which is not crossing an in-line IPS sensor. The LTD sensor performs deep packet inspection to identify anomalous network activity.
Vulnerabiltity Detector:
Scans for vulnerabilities in the operating system and applications installed on endpoints. Utilizes external vulnerability feeds updated by Canonical, Debian, Red Hat, Arch Linux, Amazon Linux Advisories Security (ALAS), Microsoft, and the National Vulnerability Database (NVD). Displays the Common Vulnerabilities and Exposures (CVE) ID numbers, Affected Package names, Severities, as well as Remediation Status.
Monitored and Managed
Our 24/7, U.S.-based Security Operations Center will manage and monitor your network for security breaches, and respond immediately to stop threats dead in their tracks.