Collecting Data Like No Other: Cybereason Endpoint Silent Sensor

February 18, 2015 | 1 minute read

Endpoint data is essential to reveal complex hacking operations, as it is the most reliable, robust and complete source of information about users, processes, files, hashes, network traffic, credentials, user privileges, behaviors - and more.  This is why Cybereason developed its detection and response platform on endpoint data collection.

Cybereason data collection is unique as it is based in the user-space of the operating system. This provides organizations with the vast visibility they need, while also ensuring that machine stability and end-user happiness can are maintained at all times.

Why is endpoint data essential to uncover the most sophisticated cyber attacks or APTs?

Endpoints carry the most accurate, first-hand information needed for the detection of persistent, non-signature based attacks. Cybereason Silent Sensor collects valuable data across an organization's environment, such as:

  • Process information
  • Connections information
  • File information
  • Driver information
  • Autorun information
  • System mount points
  • Machine information
  • User information

This data is extremely valuable to security in that it provides them with enterprise context and a vast visibility scope, which helps organizations detect malicious activity and complex cyber-attacks early on.

In an earlier post, we discussed the pain associated with kernel-level endpoint integration. Luckily, with Cybereason, the first user-space endpoint security solution, IT and security will finally be at ease.

What makes Cybereason endpoint detection and response platform non-invasive and frictionless? 

  • Does not cause blue screens
  • Is driver-free and does not interrupt user activity
  • Has a self-calibration mechanism that limits its CPU consumption ensuring it never exceeds 5% of CPU or memory
  • Includes a prioritization function that de-prioritizes the sensor activity to ensure the it does not interfere with any tasks
  • Self regulates data transmission over the course of the day to ensure that critical data is sent to the server while not overloading the network
  • The Silent Sensor’s differential data transmission mechanism significantly reduces the amount of data sent to the server, making the average daily data transmission per endpoint a negligible 1-2 MB
Lital Asher-Dotan
About the Author

Lital Asher-Dotan

Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.