Make More of What You Already Have

empow’s security platform radically upends traditional approaches by integrating with your existing network infrastructure and breaking down your security tools into their individual components – what we call Security Particles™. This creates a taxonomy of security functions that mirrors advanced attack kill-chain models, and enables modeling targeted defense strategies. Sitting atop of your existing security configuration, the empow Security Platform then executes these defense strategies throughout the network, coordinating optimal detection, investigation and response according to each defense strategy in place. Now you will know that your security is tackling attacks in the right way, every single time, and turning what you have into what you need.

It Works for

Ransomware

Financial data-leak

Privilege escalation

Insider threat

Intelligence gathering

Personal data-leak

The Power of empow

Gives you the confidence of knowing your security organization
is responding in the right way, every single time.

Enables strategic defenses that are aligned to prioritize business risks.

Automates investigation and real-time incident response against advanced attack campaigns.

Automatically deciphers the intent of security events for instant cause-and-effect correlation – eliminating the overhead of correlation rules and playbooks maintenance.

Offers insight into your security posture and gaps, security tools' performance and ROI.

Unlocks the untapped power of your existing security apparatus, to create cybersecurity that is exponentially better than the sum of its parts.

An Intent-based Security Language

empow provides a strategic, vendor agnostic, intent-based security language - which allows customizing, or using pre-built targeted defense strategies (Security Apps). The intent-based security language mirrors advanced attack kill-chain models, the taxonomy of attackers’ tactics, techniques and procedures; and is further extended with community terms. To model targeted defense strategies, the empow security language is made up of Security Particles that include detection, investigation and response functions to counter attack missions.

An Adaptive Security Platform

empow’s adaptive security platform sits on top of the network infrastructure and actualizes the intent-based security language by translating targeted defense strategies (Security Apps) into coordination instructions for detection, investigation and response according to each Security App. The Platform effectively implements and executes these throughout the organization’s existing security tools and network infrastructure, while continuously measuring the security system and the effectiveness of its tools.

The Process Behind the Promise

empow’s solution is made possible by empow’s proprietary AI technologies, which are strategically integrated into the following process:
1
Logs and Data Sources
2
Machine Learning
Classification Process
3
Attack Story Discovery
through Cause and Effect Analytics
4
Dynamic Response Orchestration and selects the best tool
to execute it

Security Applications

Each Security Application represents a smart orchestration model that protects against a threat scenario or attack campaign. Each app includes detection, investigation and decision workflows that strategically assemble different security particles, integrating the most appropriate and effective capabilities from the network . Leveraging the abstracted language of intent makes the Apps strategic, vendor-agnostic, and adaptive in activating the underlying infrastructure of security products and network devices.

1

Logs and Data Sources

The empow Platform collects and analyzes logs, data and intelligence feeds from existing security products, domain controllers and servers, using a range of plugins for third-party network and end point solutions. If needed, new plugins specific to the customer’s needs can be developed by empow’s Professional Services team within days, and easily-configured custom data sources may be added.

2

Machine Learning Classification Process

empow’s Security Platform deciphers the intent of each collected log, using machine learning and Natural Language Processing (NLP) algorithms. The algorithms emulate the actions done today by the Security Analyst: deciphering the logs, seeking out relevant information from the log itself and from third party data sources outside the organization, and identifying the attack intent. If the attack intent is a threat according to the organization’s defense strategy (Security App), then it advances to the next stage - cause and effect analytics. This process runs continuously and automatically, with zero human involvement.

3

Attack Story Discovery through Cause and Effect Analytics

The security analytics engine identifies cause-and-effect relationships between the collection of deciphered intents, grouping them together and creating a visual attack story. This engine also emulates human security expert processes, decides in real-time which investigation policies are required, and according to its internal risk assessment capabilities, decides which proactive response policies to employ. These are then dynamically executed in the network. The investigation and response policies are dictated by the Security App.

4

Dynamic Response Orchestration

empow’s Contextual Orchestration Engine dynamically identifies the required investigation and response actions, and selects the best available products and network tools to execute them . This translates into fast and optimal incident response, while at the same time simplifying security operations and eliminating maintenance overhead.

Security Apps

Our security platform has predefined security applications,
all of which are customizable.

Financial data leak

Identifies and blocks campaigns that try to gain admin privileges in order to conduct a range of attack types on the organization.

Insider threat

Mitigates e-mail spoofing fraud campaigns targeted at individual users, resulting in confidential user information theft and more.

Ransomware

Identifies and blocks campaigns that try to gain admin privileges in order to conduct a range of attack types on the organization.

Privilege escalation

Identifies and blocks campaigns that try to gain admin privileges in order to conduct a range of attack types on the organization.

Spear phishing

Mitigates e-mail spoofing fraud campaigns targeted at individual users, resulting in confidential user information theft and more.

Intelligence gathering

A generic application that identifies and mitigates against intelligence gathering attack vectors, including incidents that can evolve into actual attacks.

DIY

empow recognizes that your team’s skills are an essential component
of your overall security.

That’s why our platform is built to leverage your skills and requirements to create new security applications. Your security experts can easily build apps using a guided UI process where they select the security service and security functions, as well as workflows that will integrate detection, investigation and mitigation behaviors. Once built by your team, these apps become part of the tool-set that empow abstracts and orchestrates.

empow Network Traffic Behavioral Analysis Service

empow’s solution comes with an out of the box adaptive behavioral analysis service that adds visibility to your internal network's traffic and detects unknown threats in it. Based on empow’s network DPI software engines, the network traffic analytics service learns and profiles the normal patterns of behavior of users and servers inside the network, and identifies behavior anomalies that can be associated with various threat categories.

Threat Analytics Reporting
and Security Diagnostics

The empow Security Platform provides advanced threat analytics and security system diagnostics. The Platform includes Threat Analytics monitoring and reports that cover the different threats targeting the organization – providing threat management visibility into the organization’s security posture.

The empow Security Platform enables a detailed Security Diagnostics Service that provides fact-based analysis of the security apparatus and security tools, effectiveness against threat scenarios and compliance models.

Contact Us

Please fill in your contact info
and we will get back to you soon.