Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
www.cynet.com
CYNET PARTNER PROGRAM
CYNET 360 OVERVIEW Cynet 360 transforms how breach protection is done,
replacing legacy stacks of multiple security products
with a single platform that consolidates and integrates
endpoint, network and user protection.
THE CYNET PARTNER PROGRAMCynet views partners as its true force multipliers and
dedicates focused efforts to build power relationships to
drive mutual business at scale.
As such, Cynet’s partners get continuous support by
Cynet’s Marketing, Sales and Technical teams, to ensure
rapid and efficient sales cycles from initial meeting to
production deployment.
PARTNER OPPORTUNITIES
KEY BENEFITSImmediate Time-to-Value Cynet smart agent auto-deploys itself and is fully operable within two clicks.
Unparalleled Accuracy Cynet Sensor Fusion collects all core activity signals, gaining clear insight into the unique context of each event, reducing false positives to minimum.
Complete Attack-Surface CoverageAirtight protection from all attack vectors that target users, the network, filses and hosts.
Fully Automated Response The widest set of automated response workflows for any type of attack.
Includes SOC services Elite team of 24/7 threat analysts and security researchers.
SOLUTION PROVIDERS & RESELLERSResell a highly differentiated
platform that comprises both
native integration of NGAV, EDR,
Network Analytics, UBA and
Deception functionalities, as
well as 24/7 SOC services.
MSPs & MSSPsProvide a full breach protection
service with a cost-effective
single platform that converges
critical endpoint, user and
network security functionalities,
which otherwise would require
multiple products to deliver.
INCIDENT RESPONDERS & CONSULTANTS Use Cynet 360 for free, to accelerate
and optimize your response
workflows with lightspeed visibility
into investigated environments,
advanced forensic tools, automated
threat detection and a complete set
of remediation actions.
www.cynet.com
CYNET 360 PLATFORM CAPABILITIES
Vulnerability Assessment
Log Collection & Retention
File Integrity Monitoring (FIM)
Inventory Management
MONITO
RING &
CONT
ROL
Pre-set Remediation
Custom Remediation
Automated Playbooks
RESPONSE ORCHESTRATION
CyOps SECURITY SERVICES
ThreatHunting
ThreatIntelligence
IncidentResponse
SENSOR FUSIONTM
PREVENTION & DETECTION
Next-Gen Antivirus
Network Analytics Deception
EndpointDetection& Response
UserBehaviorAnalytics
MONITORING & CONTROLSeamless discovery and reduction of exposed attack surfaces
Cynet 360 automated collection and correlation of all activities across the environment results in deep visibility, introducing unmatched ease and agility into operations such as vulnerability management, file integrity monitoring and inventory management.
PREVENTION & DETECTIONThe widest attack vectors coverage available
Cynet 360 leverages its collection of process execution, network traffic and user behavior signals to provide both the prevention and detection capabilities of NGAV, EDR, UBA, Network Analytics and Deception solutions, as well as to correlate the unique context of each event, unveiling threats that are invisible to each of these technologies by itself.
RESPONSE ORCHESTRATIONFull automation of response workflows
Cynet 360 automates all response workflows, utilizing the largest set of remediation actions for infected hosts, network-controlled traffic, malicious files and compromised user accounts, as well as environment-grade response that involves core components such as firewall, AD and others.
CyOps Security ServiceTop security expertise complementing Cynet 360 technology
Elite team of threat analysts and security researchers that operate a 24/7 SOC service, providing incident response, in-depth investigations and proactive threat hunting as part of the Cynet 360 offering.
OPERATIONAL HIGHLIGHTSLight-speed deployment: up to 50K hosts/servers in one day.
Automated discovery and self-deployment on new machines.
Available on-prem, SaaS or hybrid.
OS agnostic: Windows, Mac, Linux (5 flavors).
Protects hosts, servers and virtual environments.