EOC Parallax image

Key Features

The APEX™ Platform is a robust cyber intelligence platform with exclusive access to hacker networks and malware communications that are active all over the world.

This includes both Advanced Persistent Threats (APTs), like state-sponsored hacking groups and organized crime, as well as smaller and less well-known crime groups. The platform tracks over 10,000,000 compromised IPs and 50,000 compromised organizations (and counting), including thousands of compromises which are not publicly known. To collect this information, Prevailion’s team undertakes sophisticated intelligence operations. All of the data contained in APEX™ is 100% original and exclusive, and not culled from other sources.

125B

Malicious Beacons

12M

Unique IP Addresses

306

Malware Families

Adversary Intelligence Collected in APEX™ Platform during the Last 180 Days

Beautiful Simplicity

Although the back-end operations are complicated,
the front-end is remarkably simple.

APEX™ was designed to be incredibly easy to use,
even for those who lack a technical background.

Simple. Easy UI

APEX™’s user-interface (UI) is familiar, as it operates like a standard search engine. Users simply type in the name of the company (or IP address) they want to find, and APEX™ will immediately populate results for any current or historic compromises detected in that company’s IP range over the past 180 days.

Watchlists

Users can create custom watchlists for any companies or IP addresses they wish to monitor. APEX™ will provide instant updates and alerts on any newly detected malicious activity within those targets, keeping your organization ahead of these rapidly evolving threats.

Risk View

APEX™ presents threat activity in an easy to understand format. Using a color-coded ranking system, (Severe, Critical, Elevated, Stable), APEX™ clearly shows how at risk a particular organization really is in cyberspace. It also provides a ‘trending arrow’ to show whether the malicious activity is on the rise or in decline.

Threat Specifics

For a deeper look into organizational risk, APEX™ provides a detailed account of the observed malicious activity within the searched company. Users can see: how many (and which) IPs are compromised; the actual malware they are compromised with; and how often this malware is “beaconing” back to the attackers.

Telemetry

Users can also download the full telemetry of these confirmed attacks, for any organization that they are subscribed to. This APEX™ feature provides the telemetry details necessary to support security investigations or potential incident response, including the victim IP address, C2 node (actual server used by attacker), malware family, threat actor identification and timestamp. All of this data can be exported as a CSV file.

Charts

APEX™ users can also monitor the larger trends in cyber compromise activity, by industry and by region. The platform provides several real-time charts, including ‘Compromise by Sector’ (86 industry sectors tracked), ‘Compromise by Geography’ (all nations included), ‘Stages of Compromise’ and ‘Stages of Compromise Over Time’.

Copyright 2023 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.