A lightweight sensor runs in the background and continuously collects endpoint activity information including process executions, binary loads, network connections, registry and file modifications, cross-process events and more.
Our analytics engine combs through your computers’ activity data using the latest threat intelligence to determine if a threat is on your computer.
Once a potential threat has been identified an internal investigation begins. Our investigation combines human intelligence and the use of 3rd party threat research to determine if the threat is valid or a false positive.
Once we’ve confirmed the threat is valid you’ll be immediately notified so that further action can be taken.