Percent of victims notified of a breach by an outside entity: 69%
Median time from earliest evidence of compromise to discovery of compromise: 205 days
- Mandiant® M-Trends® 2015
No problem can be solved by the same kind of thinking that created it. -Albert Einstein
You've spent millions preventing the breach, and yet compromise goes undetected for months.
Whether malware was introduced through an 0-day or an insider, defending your network is all about reducing time-to-detection and time-to-remediation. But how do you react quickly to something you simply can't see? Intruders continue to exfiltrate your most valuable secrets while remaining undetected in your network for months.
The AntigenC2™ Managed Security Service (MSS) is here to put an end to this state of affairs:
AntigenC2™ uses advanced machine learning and statistical techniques to identify the behavioral fingerprints of C2 communications used by implants and backdoors.
AntigenC2™ focuses on the HTTPS(SSL/TLS) and HTTP communications that are allowed through your firewall and are used as C2 channels by malware.
AntigenC2™ provides your organization a way to analyze SSL communications without decrypting traffic - keeping the legal department and your employees happy.
Keep the legal department happy while giving your team the insights they need into encrypted SSL sessions.
Find insider-assisted implants that completely bypass your phishing and browser 0-day protections.
Detect novel malware for which no signatures exist and/or are strongly encrypted.
Give your internal team the threads they can pull on to fully unravel an attacker's plan.
Don't be caught off guard being informed by a third party that you have been compromised.
Quickly indentify the traffic of similar malware even if the binaries are completely different.
The AntigenC2™ sensor is a 1U network applicance that is installed in your data center and is provided with a copy of your egress traffic.
R5 analysts connect remotely to the sensor and continually analyze HTTP and TLS communications leaving your network.
When R5 analysts determine there is a high probability of concern for a particular endpoint, an out of band alert is delivered to your company.
R5 generates monthly reports summarizing recent alerts and any ongoing suspicious activity seen by the sensors.
AntigenC2™ is available for use in multiple configurations.
The principles of R5 hail from the United States Intelligence Community. We approach problems with a unique mindset that separates us from our peers. We specialize in taking leading research from multiple facets of academia, the security community, and our in-house researchers; and operationalizing it into real-world capabilities. We seek to arm commercial industry with best-in-class technical solutions to the myriad of security challenges they face in today's hostile global marketplace.
- Arthur C. Clarke
Research and engineering in big data analytics, machine learning, and artificial intelligence.
Embedded/real-time and system-level design, development, and reverse engineering.
Risk assesments; Guidance for deploying capital; Interview assistance; Vendor management.