Full Visibility Includes:
Network Visibility
Morphick’s network sensors see every packet that goes across a monitored network. Not only are the packets run through our dynamic detection engines, but all files are recreated and analyzed. Morphick even provides file carving capabilities which are able to unpack embedded files (zip, embedded macros, etc.) and submit them into the detection engines. Hostnames, URLs, source, destination IP’s and file hashes are then correlated across the environment to enable attack detection and scoping as well as threat hunting.
Email Visibility
Morphick’s Email service examines all in-bound email. Email headers, content, attached files and embedded URL’s are all interrogated by our dynamic detection engines. File carving also takes place on all attachments allowing Morphick to examine all embedded content (zip, embedded macros, etc.). Sender, receiver IPs, embedded URLs and file hashes are then correlated across the environment to enable attack detection and scoping as well as threat hunting.
Endgame Endpoint Visibility
The Endgame Zero Breach Tolerance EDR Platform applies machine learning and other advanced techniques to provide the industry’s deepest and most accurate inspection across every layer of the endpoint via dissolvable sensors.