throbber
Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 1 of 7
`

`

`

`

`

`

`
`Exhibit 32
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 2 of 7
`
`Data Sheet
`
`Cyphort and Next Generation
`Advanced Persistent Threat Defense
`
`Cyphort network-based, next generation APT defense solution evolves as rapidly as the threats it
`is designed to detect, providing a unique experience by utilizing a single “pane of glass” for threat
`visibility across an enterprises perimeter and internal networks, ensuring the identification of initial
`compromised systems, and the ongoing internal threat progression.
`
`Cyphort eliminates alert overload by utilizing extensive threat correlation and in-depth context for your
`infrastructure. The result is a solution that reduces time from detection to remediation and is able to
`be deployed across an enterprises global infrastructure quickly as flexible physical, virtual or cloud
`appliances.
`
`Highlights of the Cyphort Solution
`
`Detection That Evolves With Threats: Cyphort has innovated a machine-learning based detection
`engine that adapts with the changing nature of threats, ensuring new zero-days, APTs and evasive
`threats are always detected without having to wait for new software or system updates.
`
`Single Pane of Glass Correlating All APT Activity: Cyphort provides a single pane of glass for
`perimeter (North/South) and lateral (East/West) threat activity across enterprise organizations. Built-in
`correlation provides security professionals with a comprehensive view of their current security posture
`with respect to advanced attacks while eliminating unnecessary alert overload.
`
`Flexible Deployment: Cyphort’s solution is easily and cost-effectively deployed in single locations,
`across distributed enterprises and/or virtualized cloud environments for ultimate flexibility and
`scalability. By developing a distributed architecture and leveraging software eliminates the need for
`physical appliances, dramatically reducing complexity while optimizing customer ROI.
`
`What Makes
`Us Different
`
`Single pane of glass threat
`visibility and correlation
`across perimeter and internal
`networks allowing you to see
`the initial compromise and
`scope of an attack
`
`Adaptive sandbox array and
`machine learning analytics
`detection that evolves with
`threats ensuring the latest
`threat techniques are detected
`
`Contextual risk quantification
`for prioritization and optimized
`workflow minimizing
`unnecessary remediation
`activities
`
`Customer created Golden
`Image capabilities giving
`customer real-world endpoint
`detection context
`
`Endpoint infection verification
`to focus remediation efforts on
`truly compromised systems
`
`Flexible deployment as VM,
`software or hardware
`
`1
`
`http://www.cyphort.com/resources/literature-downloads/
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 3 of 7
`
`Dynamic Detection™
`
`Machine Learning + Behavioral Inspection = Dynamic Detection™
`Unlike 1st generation behavioral systems that leverage heuristics based analysis for threat detection,
`Cyphort’s innovative Dynamic Detection™ method utilizes a Machine Learning engine combined with
`Behaviorial Inspection analytics to adapt to evolving malware and new threat techniques, including
`evasion tactics.
`
`Defeat evasion with adaptive sandbox array
`Cyphort’s Array of Sandboxes including virtualization and system emulation combined with a deep
`understanding of evasion and cloaking techniques allows the detection of evasion by ensuring that
`malicious code elicits enough behavior to make a determination.
`
`Detect obfuscated, multi-part threats
`Cyphort’s architecture has the capability to track multi-part attacks that employ obfuscation, or
`fragmentation to avoid detection with first generation APT solutions. By tracking users interaction
`with external sites, the system can effectively “replay” the entire interaction the same way an
`endpoint would be compromised, ensuring the inspection environment is able to retrieve the same
`payload that would detonate on an endpoint.
`
`Cyphort Dynamic Detection™
`method consistently finds
`next-gen threats with
`combined Machine Learning
`and Behavioral Inspection.
`
`Cyphort Dynamic Detection™
`
`Unsurpassed relevance
`with Custom Golden Image
`Sandbox
`Cyphort allows customers to create
`and customize their own behavior
`analysis sandbox environments
`(Golden Image) mimicking the
`applications and endpoint protection
`solutions they have on their actual
`endpoints. This ability helps
`customers assess the impact of
`malware crossing the network in
`their own environment allowing
`laser focus to the threats that are
`“known” to compromise the endpoint
`systems, optimizing incident response
`resources to deal with the threat.
`
`2
`
`http://www.cyphort.com/resources/literature-downloads/
`
`Data Sheet : Next Generation APT Defense
`
`CYPHORT
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 4 of 7
`
`Correlated Visibility
`
`View all correlated lateral and perimeter threat activity
`When coupled with Cyphort’s lateral-spread capabilities, customers are able to trace not only how
`threats enter an organization, but how they are progressing inside the organization, including
`additional devices that become compromised.
`
`Cyphort Advanced Threat
`Defense user interface
`provides complete visibility of
`correlated threats.
`
`Find threats across multiple threat vectors and platforms
`See all threats irrespective of which vectors (web, email or file share) they utilize to spread and the
`platforms (Windows, Mac, Android, Linux) they are targeting.
`
`View threats across their Cyber
`Kill chain lifecycle
`Cyphort detects threats across the threat
`lifecycle and correlates the information
`as threat changes state across Exploit,
`Download, Command & Control, Lateral
`Spread and Internal Threat Activity.
`
`Eliminate alert overload
`Cyphort dramatically reduces false
`positives and suppresses the noise from
`irrelevant threats. Accurate detection
`combined with the knowledge of intent,
`target value, cyber kill-chain stage and
`security posture of the target yields risk-
`based prioritization for incidence response.
`
`3
`
`http://www.cyphort.com/resources/literature-downloads/
`
`Data Sheet : Next Generation APT Defense
`
`CYPHORT
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 5 of 7
`
`Deployment Versatility
`The Cyphort decoupled architectural advantage
`The Cyphort solution is delivered as software that can be installed on general-purpose servers, virtual
`machines and AWS cloud environments. The solution is designed to be scalable and distributed
`across distributed locations. The two key components of the solution are Cyphort Collectors and the
`Cyphort Core.
`
`Cyphort Collectors
`Collectors are software-based sensors typically installed on commodity, low cost hardware or as
`virtual appliances, and are deployed at strategic network locations throughout a customer’s network
`Internet egress points, data centers or branch offices. Collectors monitor network traffic out of band,
`collecting ‘objects’ to be inspected for the presence of malware or other threat activity. The collectors
`also monitor outgoing activity for the presence of malicious callbacks from compromised hosts.
`
`Cyphort Core
`The Cyphort Core is the centralized detection component and contains the advanced threat detection
`and mitigation logic. Collectors forward the collected network objects and associated metadata
`to the Cyphort Core for analysis. The Cyphort Core also includes an analytics engine for accurate
`threat classification. The Cyphort Core then correlates the aggregated data across all collectors for
`verification and mitigation of attacks.
`
`4
`
`http://www.cyphort.com/resources/literature-downloads/
`
`Data Sheet : Next Generation APT Defense
`
`CYPHORT
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 6 of 7
`
`Cyphort Security Ecosystem
`Integrations
`
`Built upon an extensive open API, Cyphort solution integrates with the larger security infrastructure
`environment to enable greater coverage and threat containment abilities. Cyphort solution comes with
`built-in integrations with popular perimeter security solutions, such as Firewalls, IPS devices and web
`proxy solutions, to provide automated containment of the threat activity at the perimeter. In addition,
`Cyphort provides integration with endpoint detection and response tools to deliver increased threat
`assessment accuracy and coverage.
`
`5
`
`http://www.cyphort.com/resources/literature-downloads/
`
`Data Sheet : Next Generation APT Defense
`
`CYPHORT
`
`

`

`Case 3:17-cv-05659-WHA Document 171-27 Filed 07/27/18 Page 7 of 7
`
`Cyphort
`Subscription
`Offerings
`
`Cyphort
`One-Time
`Services
`
`Boundary Level
`Perimeter APT Defense
`
`Enterprise Level
`Perimeter + Lateral APT Defense
`
`License by total bandwidth, unlimited
`locations
`
`Lateral Spread Detection across your
`entire network
`
`Combined Web, Email, File-sharing
`applications with user upload
`
`Includes Windows, Mac, Android and
`Linux OS
`
`1 or 3 year subscription options
`
`All the features of Boundary Level
`
`1 or 3 year subscription options
`
`30-Day Evaluation
`Receive a complimentary 30-day
`evaluation of our full product
`
`Test drive all the next-gen APT
`defense features
`
`Integrate with your API
`
`Receive hands-on support from APT
`threat defense experts
`
`Security Threat
`Analysis Report
`Receive a complimentary,
`customized security threat analysis
`report (STAR)
`
`Uncover hidden threats within your
`network
`
`Get recommendations on how to
`quickly mitigate existing threats
`
`Physical report produced by Cyphort
`Labs Threat Research Team
`
`About Cyphort
`Cyphort is the next generation APT defense solution for Enterprise organizations. Cyphort provides a single
`pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an
`incident, while eliminating noise from false alerts and red herrings. Cyphort has leveraged the power of
`machine learning and data science to build a next generation threat detection engine that evolves ahead of
`the threats. A virtualized deployment model combined with open API based integration allows customers to
`address APT security gaps across global locations while leveraging their existing investments in perimeter
`and endpoint security for threat defense. Cyphort is a privately held company headquartered in Santa Clara,
`California. For more information, please visit www.cyphort.com and follow us @Cyphort.
`
`CYPHORT, Inc.
`5451 Great America Pkwy
`Suite 225
`Santa Clara, CA 95054
`P: 1.408.841.4665
`F: 1.408.540.1299
`info@cyphort.com
`
`Sales/Customer Support
`P: 1.855.862.5927
`F: 1.408.540.1299
`support@cyphort.com
`
`6
`
`http://www.cyphort.com/resources/literature-downloads/
`Copyright© 2014 Cyphort, Inc. All rights reserved.
`© 2016 Cyphort, Inc. All rights reserved.
`
`Data Sheet : Next Generation APT Defense
`
`CYPHORT
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket