EXTERNAL ATTACK SURFACE MANAGEMENT
Monitor your entire attack surface continuously to improve your security posture.
Board-level reporting of your organization's security rating to drive executive awareness.
Benchmark your security against your industry peers to stay ahead of the pack.
Endpoint Threat Analysis
One-Click collect bulk devices IR data operateed by a junior security engeener.
All-in-one toolbox that include forensics, detection, investigation and attribution tools.
Based on IOC, TTP, YARA and rules Easy IR can detect APT and cybercrime.
DNS Traffic Analysis
Based on DNS traffic behaviour analysis. Through the extraction of malicious behavioural characteristics, DNS protocol reduction improves the various types of unknown threats and abnormal behavioural activities in the network.
Through the deployment of traffic capture equipment, DNS resolution data of the covered territory is acquired and returned, and all domain names accessed are analysed.
DNS packets in the network are captured by listening, and certain detection algorithms are used to analyse each packet or packet that meets a certain condition; if the packet matches a certain rule built into the system, the system considers that an attack event has occurred and sends out an alarm at the same time.
