APT methodology

Unified Threat Protection

A solution to protect endpoints & network from all kind of cyber threats including malware, phishing, spyware & more.

Abbreviation Term Definition
APT Advanced Persistent Threat Prevention A sophisticated, systematic cyber-attacks program that continues for an extended period of time, backed by skilled hackers for stealing confidential information / financial data.
EDR Endpoint Detection & Response Providing the right visibility & insights to discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. EDR records systems activities and events taking place on endpoints, then provide security analyst with the visibility they need to uncover incidents that would otherwise remain invisible.
Exploit Angler Exploit Kit An exploit is a code that takes advantage of a software vulnerability or security flaw
VM Vulnerability Management Cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities.
PM Patch Management Software Update: Changes to computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs.
EPS Endpoint Security To secure endpoints (including servers, PCs, mobile etc) – generally referred to securing from Malware
IOA Indicator of Attack Observation in a network or PC, indicating some unwanted changes via probable malware
IOC Indicator of Compromise Observation in a network or PC, indicating an intrusion or unwanted activity
HIPS Host Intrusion Prevention System Monitor for malicious activity or policy violations
HIDS Host Intrusion Detection System Monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces to identify the intrusions
AI Artificial Intelligence The role of AI here is to decrease human intervention by making antiviruses on their own able to identify patterns by making it able to know threats by just seeing it. By identifying a new threat, the antivirus can then add the new pattern and character to its existing database.
ML Machine Learning Perform a specific task without using explicit instructions, relying on usage patterns & user behavior
0-D Zero-Day Attacks Identify an unidentified malware using combination of user behavior, ML, AI, Anti-Exploit, APT etc
TI Threat Intelligence Organized, analyzed and refined information about potential or current attacks; understanding patterns and developing prevention against future threats

Robust, multi-layered security products to combat next-gen malware, ransomware and other enterprise threats. Detects threats at the DNS, HTTP, HTTPS layers, before they reach your device.

What Heimdal Security Can Do

EDR, APT, UTP, Advanced Traffic Scanning & Filtering, Artificial Intelligence, HIPS, HIDS, IOA, IOC, Zero Day Malware Protection, Data Leakage, Network Analysis, System Lockdown, Potentially unwanted programs (PUPs), Code-Autonomous Protection, Cloud Management, URL & SQL injection, Next-Gen Antivirus, Banking Trojans, Pharming, Phishing, Whaling, Remote Access Trojans, Fileless Malware, Malicious Traffic Redirects, Trojan, Polymorphic Malware, Rogueware, Form-grabbing Malware, Traffic-based Malware Detection, Advanced Exploit kits, DNS hijacking, Macro & all other Viruses, Data Theft, Zero Tolerance, Realtime Cloud Scanning, User Behaviour Analysis, Drive-by Attacks, Multiple attack vectors, Email Malware Distribution, Software Vulnerabilities, Microsoft Patch Management, Common Application Patching, 3rd Party patching, Silent Vulnerability Blocking, Automatic patch deployment tool, Block Applications, Block Any Process, Application Management, Remove Any App, Block Websites, Machine Learning, Traffic Scanning, Ransomware, Online Banking Security, Sandboxing, heuristic and behavior-based scanning

Leave a Reply

Your email address will not be published. Required fields are marked *