{"id":4865,"date":"2022-02-17T02:42:01","date_gmt":"2022-02-17T02:42:01","guid":{"rendered":"https:\/\/kirin.mycycraft.com\/?page_id=4865"},"modified":"2022-02-17T02:42:01","modified_gmt":"2022-02-17T02:42:01","slug":"solution","status":"publish","type":"page","link":"https:\/\/kirin.mycycraft.com\/zh-hant\/solution\/","title":{"rendered":"Solution"},"content":{"rendered":"
[vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”rgba(10,10,10,0.01)” mouse_based_parallax_bg=”true” scene_position=”bottom” mouse_sensitivity=”1″ layer_one_image=”1581″ layer_two_strength=”1″ top_padding=”9%” bottom_padding=”9%” text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text css=”.vc_custom_1639449784628{padding-right: 6% !important;padding-left: 6% !important;}”]\n<\/p>
CONTINUOUS THREAT HUNTING<\/span> SITUATIONAL AWARENESS<\/span> ROOT CAUSE ANALYSIS<\/span> AUTOMATED ALERT VALIDATION<\/span> AUTO INCIDENT RESPONSE<\/span> Either on premise or via cloud, AIR inspects thousands of endpoints simultaneously, detects real-time threats, discovers the root cause, and instantly responds. Our Xensor agent-less mode scans the endpoints on a daily scheduled basis, while the agent mode constantly monitors the endpoints for any malicious activities.<\/p>\n The collected raw report from Xensor is sent to CyCarrier (AI-powered forensic analytics center), where it investigates malware samples, commands in memory, and other suspicious activities that signatures-based or anti-virus fail to classify. To enrich the CyCarrier’s database, the Cybertotal (Threat Intelligence) platform integrates internal sources with updated multiple external CTI data sources to provide the unique business intelligence.[\/vc_column_text][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” equal_height=”yes” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”#0a0a0a” bg_image=”2039″ bg_position=”center top” background_image_loading=”default” bg_repeat=”no-repeat” scene_position=”center” mouse_sensitivity=”1″ layer_two_image=”1152″ layer_three_image=”2039″ top_padding=”3%” bottom_padding=”3%” bottom_padding_tablet=”15%” bottom_padding_phone=”15%” text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” id=”more-features” color_overlay=”#ffffff” color_overlay_2=”#0a0000″ overlay_strength=”0.5″ gradient_direction=”radial” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”710″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”40px” equal_height=”yes” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” top_padding=”6%” bottom_padding=”6%” text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” centered_text=”true” background_color=”#221c35″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”medium_depth” column_border_radius=”5px” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”advanced” border_bottom_desktop=”8″ column_border_color=”#7ce1eb”][image_with_animation image_url=”2065″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][image_with_animation image_url=”1922″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default” margin_left=”25%” margin_right=”25%” margin_top=”8%” margin_bottom=”8%”][vc_column_text css=”.vc_custom_1638502180809{padding-right: 8% !important;padding-bottom: 3% !important;padding-left: 8% !important;}”]\n<\/p> NEXT-GENERATION MDR ENDPOINT SECURITY SYSTEM<\/strong><\/span> NEXT-GENERATION MDR ENDPOINT SECURITY SYSTEM<\/strong><\/span> NEXT-GENERATION MDR ENDPOINT SECURITY SYSTEM<\/strong><\/span> [vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”rgba(10,10,10,0.01)” mouse_based_parallax_bg=”true” scene_position=”bottom” mouse_sensitivity=”1″ layer_one_image=”1581″ layer_two_strength=”1″ top_padding=”9%” bottom_padding=”9%” text_color=”light” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″…<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"\n
\nAI-powered & forensic-based threat hunting inspects thousands of endpoints simultaneously to reduce dwell time and eliminate hidden threats residing on your endpoints.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”1612″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”custom” max_width_custom=”38%” margin_left_tablet=”6%” margin_right_tablet=”6%”][vc_column_text]\n<\/p>
\nIdentifying indicators of compromise and suspicious behaviors to assess the state of your cyber posture and determine if a breach happened or is actively occurring.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”1615″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”custom” max_width_custom=”38%” margin_left_tablet=”6%” margin_right_tablet=”6%” margin_left_phone=”6%” margin_right_phone=”6%”][vc_column_text]\n<\/p>
\nUtilize the CyCraft AIR platform to demystify the root cause and present storyline of breach to understand how and where it occurred and harden your cyber resilience.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=”yes” column_margin=”50px” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” centered_text=”true” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/6″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/6″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”1614″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”custom” max_width_custom=”38%” margin_left_tablet=”6%” margin_right_tablet=”6%” margin_left_phone=”6%” margin_right_phone=”6%”][vc_column_text]\n<\/p>
\nCyCraft understands your security teams review several thousand alerts each day, on average. The CyberTotal platform analyzes intelligence that matters to your security team and automatically prioritizes for you.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/6″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][image_with_animation image_url=”1613″ animation=”Fade In” hover_animation=”none” alignment=”center” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”custom” max_width_custom=”38%” margin_left_tablet=”6%” margin_right_tablet=”6%” margin_left_phone=”6%” margin_right_phone=”6%”][vc_column_text]\n<\/p>
\nCyCraft combines Forensic Telemetry Analysis (FTA), lateral movement correlation, malware modelling, and global threat intelligence into one single platform called CyCarrier for orchestrated and automated modern security operations.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/6″ tablet_width_inherit=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”#f7f7f7″ scene_position=”center” top_padding=”15%” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” exclude_row_header_color_inherit=”true” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text css=”.vc_custom_1640846401786{padding-bottom: 30px !important;}”]\n<\/p>CYCRAFT AIR PLATFORM<\/h1>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” bg_color=”#f7f7f7″ scene_position=”center” bottom_padding=”5%” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” exclude_row_header_color_inherit=”true” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#0a0a0a” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text css_animation=”fadeInUp”]\n
How AIR Works<\/span><\/strong><\/h4>\n
\nCombining machine learning with unique forensic telemetry technology, Xensor provides highly efficient automated threat triage and remote endpoint access for incident investigation and threat hunting.[\/vc_column_text][nectar_btn size=”small” button_style=”see-through-2″ color_override=”#ffffff” hover_color_override=”#7ce1eb” hover_text_color_override=”#ffffff” icon_family=”none” text=”Find Out More” url=”\/xensor” margin_bottom=”40%”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” centered_text=”true” background_color=”#221c35″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”medium_depth” column_border_radius=”5px” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”advanced” border_bottom_desktop=”8″ column_border_color=”#7ce1eb”][image_with_animation image_url=”2066″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][image_with_animation image_url=”1919″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default” margin_left=”25%” margin_right=”25%” margin_top=”8%” margin_bottom=”8%”][vc_column_text css=”.vc_custom_1638502180809{padding-right: 8% !important;padding-bottom: 3% !important;padding-left: 8% !important;}”]\n<\/p>
\nCombining machine learning with unique forensic telemetry technology, Xensor provides highly efficient automated threat triage and remote endpoint access for incident investigation and threat hunting.[\/vc_column_text][nectar_btn size=”small” button_style=”see-through-2″ color_override=”#ffffff” hover_color_override=”#7ce1eb” hover_text_color_override=”#ffffff” icon_family=”none” text=”Find Out More” url=”\/cybertotal” margin_bottom=”40%”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_spacing=”default” centered_text=”true” background_color=”#221c35″ background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”medium_depth” column_border_radius=”5px” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” bg_image_animation=”none” border_type=”advanced” border_bottom_desktop=”8″ column_border_color=”#7ce1eb”][image_with_animation image_url=”2067″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][image_with_animation image_url=”1921″ animation=”Fade In” hover_animation=”none” alignment=”” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default” margin_left=”25%” margin_right=”25%” margin_top=”8%” margin_bottom=”8%”][vc_column_text css=”.vc_custom_1638502180809{padding-right: 8% !important;padding-bottom: 3% !important;padding-left: 8% !important;}”]\n<\/p>
\nCombining machine learning with unique forensic telemetry technology, Xensor provides highly efficient automated threat triage and remote endpoint access for incident investigation and threat hunting.[\/vc_column_text][nectar_btn size=”small” button_style=”see-through-2″ color_override=”#ffffff” hover_color_override=”#7ce1eb” hover_text_color_override=”#ffffff” icon_family=”none” text=”Find Out More” url=”\/cycarrier” margin_bottom=”40%”][\/vc_column][\/vc_row]\n<\/p>","protected":false},"excerpt":{"rendered":"