Wir möchten auf unserer Internetseite Dienste von Drittanbietern nutzen, die uns helfen, unsere Werbeangebote zu verbessern (Marketing), die Nutzungsweise unserer Internetseite auszuwerten (Performance) und die Internetseite an Ihre Vorlieben anzupassen (Funktional). Für den Einsatz dieser Dienste benötigen wir Ihre Einwilligung, welche jederzeit widerrufen werden kann. Informationen zu den Diensten und eine Widerspruchsmöglichkeit finden Sie unter „Benutzerdefiniert“. Weitergehende Informationen finden Sie in unserer Datenschutzerklärung.
Cognito integrates with an ecosystem of security technologies to fight cyberattacks
Detect compromised hosts, their IP addresses and threat certainty, and push this information to firewalls to quarantine infected devices, halt communication with command-and-control servers, and stop data exfiltration.
Endpoint-security solutions complement the Cognito platform by providing rich contextual data about specific devices in the network, including machine name and operating system, that Cognito has detected are under attack. With comprehensive endpoint context, security teams can quickly identify malicious processes on the endpoint and respond efficiently.
Working with security orchestration, Cognito automatically detects hidden threats and correlates them with infected host devices to enable faster enforcement actions by next-generation firewalls, EDR and NAC solutions.
Endpoint detection and response (EDR)
Augment EDR with rich contextual data from Cognito about specific endpoint devices. With comprehensive endpoint context, security teams can quickly detect and respond to malicious processes on endpoints.
Automate threat hunting by enabling security teams to import local and industry-specific indicators of compromise (IoCs) consisting of malicious IP addresses, domains, URLs and user agents expressed in STIX files.
Give SIEMs rich insights into threats that evade traditional security. With visibility into all attack phases, Cognito provides an efficient starting point for investigations and SIEM rules by mapping threats to infected hosts.
The AI-based Cognito platform gives forensics investigators rich insights into active threats that are unseen by traditional security solutions by offering visibility into every phase of an in-progress cyberattack. Cognito also provides the most efficient and insightful starting point for investigations rules by precorrelating threat scores with compromised hosts.
Traffic optimization augments Cognito by inspecting, analyzing and filtering unneeded traffic. Operational efficiency is improved by load balancing, dynamically tightening filters and redirecting traffic for high availability.
Virtualized data centers
Identify critical vulnerabilities at every layer of the virtualized data center. Leveraging AI, Cognito detects hidden cyberattacks against applications, data, virtualization layers and the underlying physical infrastructure.
Native and hybrid cloud
Cognito detects hidden attackers in real time, empowers threat hunters, and speeds-up incident response in native and hybrid cloud environments. That means cybercriminals who target cloud workloads can no longer hide their attack behaviors.
Automate cyberattack response and enforcement with virtually any security solution. The open-standard REST API in Cognito provides access to security event data, platform configuration and health information.