Prevailion is excited to launch six new features in its latest release of the APEX™ Platform, version 4.6. The features, outlined below, give organizations higher fidelity on real-time compromise activity empowering your security and cyber risk teams to be more effective, work faster, and immediately prioritize confirmed threats.
Over the past four months, APEX™ Platform has increased the number of compromised IP addresses tracked by 285%.
APEX™ 4.6 provides a new and modern user interface. The new UI aides APEX™ customers in understanding more about themselves and their real-time state of compromise (and that of any organization they have an interest in observing), while preserving the functionality that customers have come to trust Prevailion for.
Enhanced GEOIP intelligence helps you quickly pinpoint the location of compromise activity to aid in operations, investigations, and threat hunting.
Conduct more efficient investigations and threat hunting through the use of a more precise, and granular method for selecting date and time ranges.
Set up and receive alerts when an organization of interest that has not previously exhibited evidence of compromise comes online and changes status within the platform.
Expedite incident response, threat hunting, and remediation with immediate access to downloadable enriched telemetry related to victim organizations that includes geographical intelligence (e.g. latitude, longitude).
APEX™ 4.6 includes support for Google Authentication and Cisco DUO two-factor authentication.
Sign up for a free account to access Prevailion’s APEX™ Platform — the World’s First Search Engine for historical and active global cyber attacks. Continuously monitor your organization and ANY third party for evidence of compromise.
A member of the FCC renewed urgency calls on Apple and Google to remove TikTok from their app stores, raising concerns that TikTok’s Chinese-based parent company is collecting user data that is being accessed in China.
What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]