NEW Release – APEX™ Platform 4.6 Delivers Greater Fidelity on Confirmed Cyber Attacks and Threats

APEX Platform 4.6
1 September 2020

Prevailion is excited to launch six new features in its latest release of the APEX™ Platform, version 4.6.  The features, outlined below, give organizations higher fidelity on real-time compromise activity empowering your security and cyber risk teams to be more effective, work faster, and immediately prioritize confirmed threats.

Over the past four months, APEX™ Platform has increased the number of compromised IP addresses tracked by 285%.

Over the past 180 days APEX™ Platform has tracked:

29.3B Malicious Beacons

469k IP Addresses

141 Malware Families

 

#1 – New User Interface

APEX™ 4.6 provides a new and modern user interface. The new UI aides APEX™ customers in understanding more about themselves and their real-time state of compromise (and that of any organization they have an interest in observing), while preserving the functionality that customers have come to trust Prevailion for.

#2 – Enhanced GEOIP Intelligence

Enhanced GEOIP intelligence helps you quickly pinpoint the location of compromise activity to aid in operations, investigations, and threat hunting. 

#3 – Granular Date and Time Range Selections

Conduct more efficient investigations and threat hunting through the use of a more precise, and granular method for selecting date and time ranges.

#4 – Advanced Watchlist and Alerts

Set up and receive alerts when an organization of interest that has not previously exhibited evidence of compromise comes online and changes status within the platform.

#5 – Enriched Downloadable Telemetry

Expedite incident response, threat hunting, and remediation with immediate access to downloadable enriched telemetry related to victim organizations that includes geographical intelligence (e.g. latitude, longitude).

#6 – Two-factor Authentication

APEX™ 4.6 includes support for Google Authentication and Cisco DUO two-factor authentication.

 


 

Sign up for a free account to access Prevailion’s APEX™ Platform — the World’s First Search Engine for historical and active global cyber attacks. Continuously monitor your organization and ANY third party for evidence of compromise.

The Latest

Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Introduction: Prevailion’s Adversarial Counterintelligence Team (PACT) is using advanced infrastructure hunting techniques and Prevailion’s unparalleled visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign.  UNC1151 is likely a state-backed threat actor [1] waging an ongoing and far-reaching influence campaign that has targeted numerous countries across […]

Prevailion CEO, Karim Hijazi- Biden’s Cybersecurity Strategy

Prevailion CEO, Karim Hijazi, comments on lacking White House cybersecurity efforts Karim Hijazi lays out why Biden’s cybersecurity strategy lacks innovation and effectiveness to deal with modern adversaries already inside companies around the globe.    

Prevailion CEO, Karim Hijazi- Tmobile Hack

Prevailion CEO, Karim Hijazi, talks about the T-Mobile hack and cloned SIM cards Karim Hijazi says T-Mobile’s breach is the largest in carrier history and discusses SIM swapping and other forms of identity theft.    

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.