EOC Parallax image

What Makes It Unique?

APEX™ is the world’s first “zero-touch” compromise intelligence platform and search engine.

Unmatched Insights

APEX™ tracks over 30,000 compromised organizations (and counting), including the Fortune/Global 500. Many of the cyber compromises detected by APEX™ and listed in the platform are not publicly known. APEX™ also monitors over 540,000 compromised IPs, 220 malware families and over one billion daily malware “beacons” (i.e., communications with the criminal server that controls it). Altogether, the platform has recorded more than 60 billion malicious events.

Zero Hardware or Software

APEX™ does not require any kind of hardware or software to be installed at the customer location. It also does not require any configuration changes to be made in the customer’s network environment. All of our compromise intelligence is collected from the threat actor’s command & control (C2) environment, which lies completely outside the perimeter of any organization

Zero Scanning or Scraping

Unlike point-in-time vulnerability assessment tools, scorecard scanning solutions, or deep/dark web scraping technologies, APEX™ does not need to focus on a target in order to achieve results. The malware infections make themselves known to our global constellation of clandestine sensors, continuously, and in real-time.

Passive Adversarial Infiltration

Using our proprietary global sensor network, coupled with exclusive law enforcement and provider relationships, we target and infiltrate criminal and nation-state command & control (C2) servers, passively harvesting over a billion pieces of confirmed evidence (malicious beacons) every day.

100% Proprietary Intelligence

APEX™ does not aggregate, combine or regurgitate data from any other sources or feeds. Our proprietary intelligence is exclusively harvested from our own collection apparatus and then organized, enriched, attributed and made instantly available via a SaaS-based UI and API subscription service.

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.