Software

LASTINFOSEC

by GATEWATCHER

Logo of GATEWATCHER

Categories

  • APT protection
  • Threat analysis
  • Early warning for IT

Categories

  • APT protection
  • Threat analysis
  • Early warning for IT
Show More

PRODUCT DESCRIPTION

LastInfoSec is Gatewatcher's Cyber Threat Intelligence (CTI) offering. Compatible with all cybersecurity solutions, it immediately enhances your detection with contextual information about internal and external cyber threats specifically targeting your business.
Integration of LastInfoSec flows is quick and easy thanks to standardized exports to the latest CTI standards and connectors available for the main analysis tools on the market:

- Standard format (Stix v2, Stix v2.1, JSON..) and compatible with existing solutions.
- Deployment in a few clicks and immediate improvement of the security level.
- Stream integration with :
- Third Party Threat Intelligence Platforms
- Network and endpoint security solutions (IDS, IPS, NGFW, BDS, Sandbox, NDR, EPP, EDR)
- Analysis tools used by your SOC (SIEM, SOAR)

LastInfoSec customer benefits:

-LastInfosec's technology continuously inventories and evaluates data sources accessible through more than 3000 multiple channels: social networks, specialized sites, the darknet and the deep web, to collect indicators of compromise that are enriched and contextualized to your activity, with the objective of reducing the time required to analyze a threat when it is detected.

-LastInfoSec makes it easier for your operational security teams to make decisions and dramatically reduces their analysis and incident response time without changing their internal processes.

-LastInfoSec has a library of six millions of indicators of compromise (IoCs). Its automated collection, analysis, and correlation engines make threat information available an average of 24 hours ahead of the competition with over 5,500 new validated and enhanced markers per day.

-Because our data is enriched and contextualized beforehand, it generates only meaningful alerts and includes all the information needed to understand them.
-Our infrastructure capabilities is not limited and will not be overwhelmed in the event of a large-scale attack. 
 
Show More

Product Expert