Cybereason Blog | Cybersecurity News and Analysis

Collecting Data Like No Other: Cybereason Endpoint Silent Sensor

Written by Lital Asher-Dotan | Feb 18, 2015 9:30:12 AM

Endpoint data is essential to reveal complex hacking operations, as it is the most reliable, robust and complete source of information about users, processes, files, hashes, network traffic, credentials, user privileges, behaviors - and more.  This is why Cybereason developed its detection and response platform on endpoint data collection.

Cybereason data collection is unique as it is based in the user-space of the operating system. This provides organizations with the vast visibility they need, while also ensuring that machine stability and end-user happiness can are maintained at all times.

Why is endpoint data essential to uncover the most sophisticated cyber attacks or APTs?

Endpoints carry the most accurate, first-hand information needed for the detection of persistent, non-signature based attacks. Cybereason Silent Sensor collects valuable data across an organization's environment, such as:

  • Process information
  • Connections information
  • File information
  • Driver information
  • Autorun information
  • System mount points
  • Machine information
  • User information

This data is extremely valuable to security in that it provides them with enterprise context and a vast visibility scope, which helps organizations detect malicious activity and complex cyber-attacks early on.

In an earlier post, we discussed the pain associated with kernel-level endpoint integration. Luckily, with Cybereason, the first user-space endpoint security solution, IT and security will finally be at ease.

What makes Cybereason endpoint detection and response platform non-invasive and frictionless? 

  • Does not cause blue screens
  • Is driver-free and does not interrupt user activity
  • Has a self-calibration mechanism that limits its CPU consumption ensuring it never exceeds 5% of CPU or memory
  • Includes a prioritization function that de-prioritizes the sensor activity to ensure the it does not interfere with any tasks
  • Self regulates data transmission over the course of the day to ensure that critical data is sent to the server while not overloading the network
  • The Silent Sensor’s differential data transmission mechanism significantly reduces the amount of data sent to the server, making the average daily data transmission per endpoint a negligible 1-2 MB