Introduction

CloudCyte is a threat-hunting platform to identify cyber risks faster and easier through a zero-trust model offered as an MDR Service. The platform provides a unified risk scoring framework for the asset, information, and forensics artifacts. Through continuous threat hunting and forensics analysis, malicious traffic, uncompliant artifacts, and unknown activity not detected by the existing security controls are identified in hours through gap analysis. The platform offers three main benefits:

1. Simplify the collection of information and forensics artifacts.

2. Create a single framework to classify risks, audit data, and information.

3. Automatically highlight and remediate the identified risks.

The platform allows organizations and MSSPs to deploy the solution on-premise or on any cloud platform in minutes. All components of CloudCyte are based on virtualized containers enabling scalability without requiring complex resource planning. The system offers two modules to protect communication inside the IT infrastructure.

Threat Hunter

CloudCyte Threat Hunter performs the collection of forensics artifacts from endpoints and the network. After collection, the system creates a neural map of how information flows within an organization. The neural map provides a library for forensics artifacts and communication patterns of how applications and OT devices communicate to discover malicious activity. The module also acts as an integration hub for existing security solutions.

E-Mail and Communication Security

The module is a GDPR-compliant e-mail phishing detection and inbox security solution. The system enables organizations to identify and delete malicious e-mails and Microsoft Teams communication bypassing the security controls.

The users can report e-mails that they suspect are suspicious. The platform provides unmatched visibility for malicious e-mails reaching the end-users. Once an e-mail is identified as malicious, the system can trigger an investigation. The investigation process enables the discovery of risky e-mails without requiring mailbox access. Once an e-mail is identified as malicious, the e-mail can be deleted from all user mailboxes.

Last updated