Datasheet Aioniq 2022
Datasheet Aioniq 2022
Datasheet Aioniq 2022
The financial consequences The growth in the volume of The persistence of an unde- The stealth and complexity of
of a cyber attack can durably threats complicates the alert tected targeted attack within the latest cyber attacks increase
weaken your organization. criticity assessment handled by your information system can the risk of compromise for your
your security analysts. increase the prejudice caused. IT infrastructure.
Aioniq®: Mapping and behavioral analysis of cyber threats for enhanced detection
and new visibility into targeted attacks.
Threat detection, even with encrypted flows. Better visibility into hidden threats. Aioniq® is able
Aioniq® is an NDR platform capable of identifying, to provide a metadata typology with a level of detail
thanks to machine learning processing, all threats that is unique on the market, in order to optimize the
within your infrastructure, even if your network flows time needed for your forensics analysis.
are encrypted.
Mapping of all the assets of the information Risk modeling by asset and user. Aioniq® is the
system. Aioniq® is the only NDR platform able only NDR platform capable of modeling the level of
to map all IT assets in a totally passive and compromise associating event, asset and user, with
agentless way in order to provide unseen level of a Mitre Att&ck view aggregated by risk of all alerts.
detection of advanced attacks on east-west flows.
www.gatewatcher.com
User benefits
Developed with a "Security by A ioniq® does not invol ve Aioniq® is an open platform
design" approach, Aioniq® is additional equipment or hidden of fering a strong reactivit y
powered by a hardened OS offering costs. The platform detects threats against attacks thanks to its
a strong resistance to corruption from the very beginning of the connection with most response
attempts and a minimized attack audit phase, without any impact and remediation tools on the
surface. on your production environment. market as EDR, SIEM & SOAR.
AN OFFER THAT COMBINES GRANULAR AND FLEXIBLE OPTIMIZED EFFICIENCY FOR YOUR
PERFORMANCE AND SCALABILITY PROTECTION SECURITY OPERATION CENTER
Aioniq® adapts to the threats Aioniq® is available in various Aioniq® eases the investigation
and specifics of your organization packages to perfectly match your of analysts and their handling of
with a scalable system of detection protection infrastructure and tech- alerts criticity by offering multiple
engines and the ability to deploy nology choices in order to provide metadata colection and detection
on premise or in the cloud. you with truly tailored protection. mapping with chronological visua-
lization compliant with MITRE
ATT&CK framework.
Use cases
Detection: A rational use of machine learning. Incident response: A seamless connection to your tools
Compared to a detection model that blindly uses AI, Aioniq® for immediate remediation in the event of an attack.
is characterized by a multifactorial approach composed of Aioniq® is an agnostic and open solution allowing a quick and
static, dynamic and algorithmic analysis in accordance with easy integration with most existing security stacks through a
the typology of the threat in order to detect the TTPs specific to large APIs catalog for a zero-latency response in case of a
each cyber attack. cyber attack.
Detection of Cobalt Strike beaconing in the context of a Rapid ability to generate custom signature files to fit the
DGA attack customer's context
Detection of network anomalies even with encrypted flows SOAR playbook automation of incident response
Detection of emerging obfuscation algorithms used in Extensive choice of APIs to EDRs for prompt and auto-
east-west lateral movement attacks mated response
Hunting: React to the very first signs of a targeted attack. Forensics: Unique attack visibility for enhanced
Aioniq® is the only solution on the industry that can cover the cyber resiliency. Aioniq®'s asset mapping capabilities
entire Kill Chain of an advanced cyber attack and identify the and its ability to link them to each user to identif y the
exploit techniques used throughout the attack, leaving hackers level of risk provides unparalleled post mortem visibility
with no place to hide. into the modus operandi of each attack.
In-depth investigation of metadata types, sessions, Collection of multiple metadata allowing the precise
protocols and user actions contextualization of each attack
UEBA management of asset-user interactions allowing to Rapid enrichment thanks to interconnections with the
concentrate only on the major cyber risks various Threat Intelligence platforms on the market
Post-mortem analysis of all metadata with next-generation Interactive graphical investigation capability to determine
indicators of compromise (IoC) the timing and propagation of each attack
About us
Gatewatcher is a leading European software vendor specialized in Contact us
the detection of the most advanced cyberthreats and intrusions. Its
unique model combines several technologies with A.I. to provide contact@gatewatcher.com
you an optimal protection. www.gatewatcher.com