L
ADING

Why Cognore?

Unpatched and Legacy Endpoint protection

  • Complete protection even for vulnerable and unpatched systems.

  • Defend against Zero day and unknown cyber-attacks.
  • Protect endpoints in foreign/untrusted environments

  • Protection rings for systems deployed in foreign/untrusted networks.

  • Customization of features as per business requirements.
  • Insider Threat Protection – Malicious and Accidental

  • Restrict users (including administrators) activity to context aware deterministic behavior.

  • Spear-phishing based Cyber-attack prevention.

  • Simplify and consolidate security

  • Includes many endpoint security features, such as, AV, Host FW, IPS, System integrity, Hardening, forensics etc.

  • No False –ve or False +ves alerts - Complete deterministic approach.
  • Incident response, containment and forensics

  • Complete visibility for forensics analysis on the fly.

  • Generate detailed links of suspicious activities.

  • Real time analysis of behavioral changes of system.

  • Alert and auto terminate the suspicious activities at kernel/root level.
  • Security without sacrificing privacy

  • No need to send your data to cloud for AI, MLG, Analytics based Cybersecurity protection.

  • Will work without any signatures, updates, cloud, AI and MLG - Self sustained sensor on endpoints.

  • [ Assured Peace of Mind against Known & Unknown Cyber Threats ]


    Technology

    Allow only Context aware Deterministic Behaviour

  • Traditional endpoint protection techniques try to find BAD behaviour (using signature, cloud analytics, AI, MLG etc.)

  • Cognore flipped the model that allows and protects only “THE GOOD” Core system behaviour and blocks the rest.

  • Makes endpoints resilient against all attacks by allowing only context aware deterministic behaviour using kernel-level algorithms that goes away beyond application whitelisting.

  • Protection Rings are implemented around all allowed computer functions using context aware deep analysis to protect aganist known, unknown and insider atatcks.
  • PROFILE -> Analyse -> Protect

  • Profile:The sensor is deployed in "PROFILE" mode providing a detailed 360 degree analysis of normal computer operations and behavior.

  • Analyse: Normal is not always good. The advance algorithms and built-in protection ring rules highlight suspicious activities, and detailed visibility allows analysts to define what is Good and what is Unknown.

  • Protect: The profiles configured from Profile and Analyse modes are used by the sensor to detect and block anomalous behavior at kernel level and protect the good computer functions using protection rings.

  • Performance and Flexibility

  • Light weight sensor (max 20mb RAM, <1% CPU, 30bm Disk).

  • Bespoke algorithms configuration based on computer functions provide deep visibility, analysis and protection.

  • Can be deployed as a self-sustained sensor – No need of signature updates or cloud connectivity for Artificial intelligence, Analytics and Machine learning.

  • Designed for central control through cloud and on premise setup.
  • Cognore delivers Cyber Security technology and services equipped with advanced technique algorithms that conduct deep analysis of computer core functions to protect against cyber-attacks using a light weight OS level kernel based sensor experience.