Gain real-time visibility
Stop data leakage
Block Malware, 0-day exploits and APTs,
Detect user, network and host malicious/suspicious behavior
Know Who did What from Where and When
Enhance/simplify your compliance and auditing requirements
No Signature-based detection
Blocks threats with real-time behavior analysis
No Performance degradation
Does not drain system resources
No Security Expertise required
Deploys without complex configuration
No Connectivity required
Works even when workstations/servers are offline
Using User & Entity Behavior Analysis (UEBA), the Agent constantly monitors policy violations, configuration files, key system files, critical files/folders, network activity and running processes, for the early detection of malicious activities and/or suspicious behaviors, which could lead to data leakage, system compromise or system performance degradation.
Upon detecting such activity, the Agent triggers a number of “Response Actions” based on the classification of the activity and the sensitivity of the Behavioral Analysis Mood applied to the user/group in question. The end result is knowing Who did What from Where and When, in a timely manner.
Constantly monitors suspicious and/or malicious behavior and activity for the detection and response to external attacks and insider threats.
Performs comprehensive user activity and behavioral monitoring and analysis in the form of intuitive visuals of actionable information, facilitating the timely and effective response to potential threats.
Continuously monitors privileged users’ activity with respect to changes made to user-defined sensitive and key system files/folders.
Enables round-the-clock real-time visibility of your security posture, helping you with your decision-making process when strategically planning your internal defenses against emerging threats and vulnerabilities.
Accelerates the detection and response to emerging threats and vulnerabilities with the integration of various Threat Intelligence feeds, presented in the form of Indicators Of Compromise (IoC).
Simplifies the deployment, configuration, reporting and updating of a large number of Agents with its built-in central administration and management capabilities. Agents may be deployed rapidly through deployment solutions such as SCCM, or an active directory group policy.
With the use of User & Entity Behavior Analysis (UEBA), log and event data collected is analyzed towards the prediction of suspicious and/or malicious activity, which would otherwise go unnoticed by traditional Antivirus Endpoint Agents.
Constantly monitors the Integrity of key system configuration files, key system files, critical files/folders, network activity and running processes, enabling the detection and response to Malware, APTs and 0-day exploits.
Tracks privileged users’ access activity, including content modifications changes, for user-defined sensitive/critical files/folders by account name and/or process, when these files and/or folders were Accessed, Created, Viewed, Modified or Deleted.
With its own built-in ticketing system, it helps you to promptly, efficiently and effectively monitor, classify and manage “Incidents” which may pose a threat to the confidentiality, integrity and availability of your information assets.
Continuously monitors and analyzes incoming and outgoing network traffic, which leads to the prompt detection and prevention of malicious/suspicious network activity including communication with malicious sites (e.g. botnets, malware, spam, phishing).
Helps you generate both scheduled as well as ad-hoc reports, using either predefined or user-defined report templates. Reports can be exported in CSV and PDF formats, and may be scheduled to be sent automatically to selected email recipients.
Supports the white-listing (excluded from monitoring) of specific applications, thus avoiding False Alerts from being raised.
Effectively supports both your organizational maintenance and/or monitoring operations with its built-in maintenance scheduling on workstations and servers. Installation and configuration of security and recommended vendor updates/fixes can be configured to be performed within a predefined date/time window by a trusted source, thus avoiding False Alerts from being raised.
The free version of ClearSkies™ NG Endpoint Detection & Response (EDR) Agent focuses on collecting in real time log and event data related to operating system, application and network related activities for real-time visibility, and it may be deployed on all workstations and servers.
In keeping with our principle “to fulfil our clients’ needs and exceed their expectations”, we are continuously revamping our platform with new innovative features and enhancements. Such features and enhancements are a testament of our pioneering role in the uncharted territory of Big Data Advanced Security Analytics. What’s New in v5.8 & 5.8.1 Sensitivity Level more
Odyssey to participate in the ‘Saudi National Security & Risk Prevention Expo (SNSR)’ in November 2018 Odyssey will be participating in the ‘Saudi National Security & Risk Prevention Expo (SNSR)’ as a valued exhibitor and contributor recognized for its expertise in cybersecurity and its provision of innovative services and solutions. As an ‘Information Security & more