PROTECT THE CLOUD

Web Security SaaS


The wide adoption, standardization and usage of encrypted traffic has left cyber defenders with a significant reduction in visibility of web traffic and at the same time has created vast opportunities for cybercriminals to leverage encrypted protocols to shroud data exfiltration and conceal command and control (C2) communications.

 

Challenge


Attacks continue to make the headlines on an almost daily basis; data breaches resulting in countless credentials being compromised and organizations experiencing system wide lockouts as a result of successful ransomware attacks. Threat actors weaponize shellcode to steal sensitive information through fake web forms posing as legitimate sites or lure unknowing victims into downloading and executing malicious files capable of harvesting their hard drives for account credentials and Personal Identifiable Information (PII).

Solution


Cloud-delivered inline inspection designed to offer runtime protection against web-borne threats which are lurking in the encrypted traffic, including zero-day, command and control (C2), and Advanced Persistent Threats (APTs).

We provide multiple inspection techniques leveraging Deep File Inspection and threat hunting, which are powered by Machine Learning (ML) algorithms and continuously updated by our InQuest Labs' researchers with the latest Indicators of Compromise (IOCs).

Our inspection engine utilizes heuristics and signature-based analytical pipelines to identify real-world emerging threats and provide the ability to block Zero-Day and N-Day attacks as well as malware infections.  Our Web Security platform also provides policy enforcement at scale even in the most complex multi-tenant environments.

Our Web Security platform also provides policy enforcement at scale even in the most complex multi-tenant environments.

 

Unique Capabilities of InQuest's Integrated Web Security SaaS Solution


 
Visibility of Encrypted Traffic

Complete, real-time visibility, inline inspection for all incoming and outgoing encrypted traffic, leveraging our patented Deep File Inspection (DFI) to detect and prevent web-borne threats.

Proactive Threat Intelligence

Built-in incident response workflow, remediation, and breach containment alleviate investigative workflows for your operators.  This provides the ability to proactively track and hunt for emerging threats that have targeted your environment.

RetroHunt Capability

Your team can retrospectively identify the most sophisticated threats and determine which assets have been impacted.

Multiple Inspection Methodologies

Multiple analytical methods are leveraged and factored for identifying a single attack technique to effectively increase the probability of detection. This methodology employs detection logic at numerous layers to uncover a wide variety of attack and exploitation techniques.

Zero-Day Attack Prevention

Protection against sophisticated attack techniques targeting unknown vulnerabilities through the continuous delivery of signature packs containing coverage and protection for those Zero-Day attacks via automated updates and feeds.

Malware Detection

Through RetroHunting, we provide new dimensions of data and time to analyze files and identify threats to ensure even the most sophisticated attacks don’t go undetected even if they were initially missed. 

Data Loss Prevention

Protect critical data with our integrated DLP capability which performs inspection of all file content and context to identify data exfiltration and ensure sensitive information never leaves your environment.

Machine Learning Capability

Augmenting human analysis to tackle the ever-increasing talent gap.  Our Machine Learning (ML) uses advanced algorithms that leverage supervised classifiers and unsupervised clusters which are designed to query vast amounts of data, discover patterns, and generate insights. 

Runtime Protection

Cloud-based platform with the ability of providing real-time protection using a combination of multi-scanning technologies such as Deep File Inspection (DFI), reputation, and advanced malware prevention.