Who's in your network?

Percent of victims notified of a breach by an outside entity: 69%
Median time from earliest evidence of compromise to discovery of compromise: 205 days
- Mandiant® M-Trends® 2015

Find Out Now

No problem can be solved by the same kind of thinking that created it.
-Albert Einstein

Introducing the AntigenC2™ Managed Security Service

Description Image

You've spent millions preventing the breach, and yet compromise goes undetected for months.

Whether malware was introduced through an 0-day or an insider, defending your network is all about reducing time-to-detection and time-to-remediation. But how do you react quickly to something you simply can't see? Intruders continue to exfiltrate your most valuable secrets while remaining undetected in your network for months.

The AntigenC2™ Managed Security Service (MSS) is here to put an end to this state of affairs:

  • The Power of Big Data

    AntigenC2™ uses advanced machine learning and statistical techniques to identify the behavioral fingerprints of C2 communications used by implants and backdoors.

  • Visibility Where It Counts

    AntigenC2™ focuses on the HTTPS(SSL/TLS) and HTTP communications that are allowed through your firewall and are used as C2 channels by malware.

  • Keep Privacy Intact

    AntigenC2™ provides your organization a way to analyze SSL communications without decrypting traffic - keeping the legal department and your employees happy.

The Benefits

Keep Legal Happy

Keep the legal department happy while giving your team the insights they need into encrypted SSL sessions.

Insider Insight

Find insider-assisted implants that completely bypass your phishing and browser 0-day protections.

No Signatures Required

Detect novel malware for which no signatures exist and/or are strongly encrypted.

Strenghten Your Team

Give your internal team the threads they can pull on to fully unravel an attacker's plan.

Law Enforcement Not Required

Don't be caught off guard being informed by a third party that you have been compromised.

Correlate Novel Malware

Quickly indentify the traffic of similar malware even if the binaries are completely different.

How it Works

1

Sensor Installation

The AntigenC2™ sensor is a 1U network applicance that is installed in your data center and is provided with a copy of your egress traffic.

2

Remote Traffic Analysis

R5 analysts connect remotely to the sensor and continually analyze HTTP and TLS communications leaving your network.

3

Out-of-band Alerts

When R5 analysts determine there is a high probability of concern for a particular endpoint, an out of band alert is delivered to your company.

4

Monthly Reports

R5 generates monthly reports summarizing recent alerts and any ongoing suspicious activity seen by the sensors.

AntigenC2™ in Numbers

60,000
Largest single sensor active client count
175,000
Largest single sensor active server count
5Gbps
Fielded sustained single sensor throughput
555
Analyst Coffee Consumed

Engagement Options

AntigenC2™ is available for use in multiple configurations.

Hourly

Incident Response
30-60 days
  • Per-engagement Technology Access Fee
  • Hourly billing during engagement
  • Out-of-band alerts
  • Weekly reports

Hourly

Breach Indicator Assessments
30-60 days
  • Per-engagement Technology Access Fee
  • Hourly billing during engagement
  • Out-of-band alerts
  • Weekly reports

Who We Are

The principles of R5 hail from the United States Intelligence Community. We approach problems with a unique mindset that separates us from our peers. We specialize in taking leading research from multiple facets of academia, the security community, and our in-house researchers; and operationalizing it into real-world capabilities. We seek to arm commercial industry with best-in-class technical solutions to the myriad of security challenges they face in today's hostile global marketplace.

  • "When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong.
  • The only way of discovering the limits of the possible is to venture a little way past them into the impossible.
  • Any sufficiently advanced technology is indistinguishable from magic."

- Arthur C. Clarke

What We Do

Applied Research

Research and engineering in big data analytics, machine learning, and artificial intelligence.

Embedded Development

Embedded/real-time and system-level design, development, and reverse engineering.

Advice and Counsel

Risk assesments; Guidance for deploying capital; Interview assistance; Vendor management.

Headquartered in Austin, TX

R5 Industries LLC
  • contact@r5industries.com
  • 775-538-2326

AntigenC2™ - Watch your egress.™