RenovaBT, one of the most experienced a “True” Value-added Distributor in Turkiye and neighbourhood countries in the region, is recognized as the Trusted Advisor with having a forefront portfolio of 15+ technology vendors
info@renovabt.com +90(312)6661349
Vendors
Lock Down Anomalous Endpoint Behaviors
Genian EDR
Endpoint Detection and Response (EDR) Is Improved When Built by A Leading NAC Vendor
Misconfigurations, Malicious Code, Fileless Threats, Abnormal User Behaviors, Ransomware, APT, and whatever else is threatening your digital assets.
Detect "X" Behavior in Real-time
Proactively detect any connected devices’ abnormal behavior, however it is caused: by misconfigured settings, policy violations, security vulnerabilities, threats, and attacks both internal and external.
Take Action Before "X" Become Critical
Instantly trigger alerts only for the abnormal activities deemed most critical and promptly remediate any non-compliant or compromised devices to mitigate risks in your business.
Endpoint activity monitoring: File, Registry, Process, DLL, etc.
File information for peripheral devices (USB)
Contextual, in-depth, and real-time analysis
Customize data collection time and its respective retention period
Detecting Threats
Known threats by Indicators of Compromise (IOC)
Unknown threats by Machine Learning (ML)
Customized pattern matching by YARA
X Behavior Analysis (XBA): Fileless threats by nonfile-based indicators such as particular execution events or behaviors
Genian Ecosystem: Sharing file reputations, whitelists, alerts, and malicious data information among Genians’ customers to increase the accuracy of detection and decrease remediation time
Interrogating Detected Threats
Behavioral and heuristic analysis
Consolidated threat information
Integrated and relevant search engine
Event timeline and chain of event correlation
Third-party Cyber Threat Intelligence (CTI)
Live response to access a compromised device immediately via a remote console for further in-depth investigation and countermeasures
Visualizing X
Personalized KPI dashboards using customizable widgets and libraries
Instant search and filtering
Automating Incident Response
Automatic alert remediation (Alarm, Isolations, Quarantine, Terminations) for compromised devices
Security orchestration
Integrated with NAC solutions to prevent the expansion of threats at the edge
Integrated with SIEM solutions to enhance intelligence
RESTful API, SNMP, Syslog support
Integration plugin support
Components
No Disruption In Network Operation. Low Impact To The End-User
EDR Server
Event Raw Data collected by E-Module store and backup
Threat and anomaly detection
Detected Threats analysis
Comprehensive event analysis, Time series analysis, Root cause analysis
Personalized dashboards and reports, customizable widgets
Agent Management Server
Auto detection and classification for all IP-enabled devices
Policy-based access control
Isolation and remediation for compromised devices at the network layer
Integrated wired/wireless authentication
Integration with user database systems
Asset management for installed hardware, software, platforms, and patch
IP address management
Application-based comprehensive Agent
EDR Module (Agent)
Endpoint activity monitoring: File, Registry, Process, DLL, etc.
Collected data sent to Server
Notification, alerts, process kill, access denial against threats at the endpoint layer
Isolate compromised endpoint and lock down its user
Ecosystem
Share Faster
Genians’ Ecosystem collects threat information detected and reported from Genians’ customer sites. All collected information is aggregated and therefore anonymous.The refined information and reputation services can be shared with other customers right on time.
Integration
Maximizing EDR Empowered By Next-Gen NAC
When Genian EDR integrates with Genian NAC, Genian EDR can gain better network visibility by identify and classifying all connected devices. Also, Agent actions can be maximized to respond threats more effectively.