PRODUCT OVERVIEW

Here’s a quick look at how RADAR360 is radically unique vis-a -vis the existing Defense-in-Depth security products:

Protection RADAR360 Other DiD Products
Mode Completely Proactive, therefore lends a sense of 100% Security Signature & Known behavioral pattern detection Based, hence mostly REACTIVE
Attack Vector Protects against 3 of the Biggest attacks-0 Day, Insider Attacks and Unknown attacks inc Memory based exploits The REACTIVE nature of the Existing Defence-in-Depth products prevent them for safeguarding against these sophisticated attacks
Technology RADAR360 Other DiD Products
Core Philosophy Based on the core logic of PROTECTING THE GOOD CORE SYSTEM BEHAVIOUR, rest all is Unknown, therefore Blocks/terminate at kernel/User space Level [ Protection in its SUPERLATIVE FORM] Runs after/tries to find the BAD behavior using Signature, Cloud Analytics, AI, MLG etc
Product Uniqueness RADAR360 Other DiD Products
Patch Management Revolutionary Kernel level virtual patching technology ensures the systems are not required to be patched ever again ( gives good lead time to test and apply needed only) PATCHING is a must and one of the biggest pain areas that’s not just laborious but also involves massive amount of time, effort and money.
Foot Print Strikingly Ultra Light Weight at just 15-20MB RAM USAGE Consumes huge computing resources, average of 20% and upwards
Resource Consumption With 100% of sensor code written in C & C++, it allows for Benchmarking’ ly Negligible CPU Utilization of under 1 % with HDD space consumption of 30MB Network Bandwidth is just limited to alerts reporting to dashboard( configurable) Consumes huge computing resources, average of 20% and upwards
Customization/TAT Ability to Offer complete security customization as per Organizational business logic in the least possible time No much Customization
Legacy & Un-patched Systems Protection 1st of its kind to offer complete protection to the most vulnerable and legacy systems - Windows XP and Windows 2003 for Server class or old Windows legacy Embedded OS This is One of the Biggest concerns for legacy verticals/firms in BFSI, Pharma /Manufacturing etc which is a major exploit
Complete Deterministic Approach No false +ve or False -ve
Ease of Admin/Control RADAR360 Other DiD Products
Contextual Behavior Analysis Revolutionary Kernel level virtual patching technology ensures the systems are not required to be patched ever again ( gives good lead time to test and apply needed only)Monitor real time changes in Files, Processes, Memory Leakages, Network Connections, Registry, USN Interface, Hardware Changes and OS Configuration, that lends complete flexibility to the businesses owner or administrator to define and protect
Self Sustained Sensor Signature-less, That works without any Signatures, Updates, Cloud AI,TI and MLG etc, Completely Signature Based, resulting in a complex, multi product environment shooting up the cost of ownership.
Non Intrusive Completely Non Intrusive from end user experience Stand point. Runs as a service in the background (without any icons/pop- ups) Independent of existing security product landscape & can co-exits with any other products
End User Cyber Knowledge Agnostic The very premise on which RADAR360 is designed ensures that Technology overrides the human element and therefore is totally neutral to the cyber security knowledge of end user.
© 2018 All Rights Reserved.