Agentless Endpoint Threat Detection and Response
OVERVIEW
Increased complexity and frequency of attacks elevate the need
for enterprise-scale incident response, APT investigations and a
rapid forensic response process. Outlier provides comprehensive
threat monitoring, alerting and analysis of endpoints, without
agents and complex management.
Automated Security Analytics
The Outlier system continually collects digital evidence from
computers throughout your network and applies advanced
analytics, incorporating statistical analysis, machine learning
algorithms and cloud-based big data threat intelligence. The
system not only detects known Indicators of Compromise, but
goes further to identify anomalies and statistical outliers to
pinpoint new and unknown malware, malicious actions, and
suspicious events typical of targeted attacks. A multi-stage
reasoning process separates real threats from low-risk indicators
and false positives, so incident response teams can focus on
critical issues.
Alert Reporting and Endpoint Visibility
Outlier empowers security professionals to quickly respond to
threats and examine suspect computers. Automated alerts
conveniently include the underlying contextual evidence for threat
verification. The flexible next-generation IOC query subsystem
allows ad hoc analysis of network-wide historical endpoint data.
Lowest Total Cost of Ownership
Delivered as Software-as-a-Service and agentless, Outlier
dramatically reduces costs for system implementation and
management. Endpoint data collection is passive and has no
impact on the user’s experience. Outlier makes your security
team more productive.
Outlier is an Agentless Endpoint Threat Detection and Response system that automates
the best practices of world-class cyber security investigators. It proactively detects new
and advanced threats missed by legacy cybersecurity systems, and allows speedy
validation of alerts and investigation of incidents. Outlier’s agentless technology removes
headaches and costs associated with managing agents.
Outlier	
  Security,	
  Inc.	
  	
  |	
  	
  1150A	
  Highway	
  50,	
  	
  Box	
  487,	
  Zephyr	
  Cove,	
  NV	
  89448	
  	
  	
  
Phone:	
  	
  775-­‐589-­‐2150	
  	
  |	
  	
  Email:	
  	
  info@outliersecurity.com	
  	
  |	
  	
  Website:	
  	
  www.outliersecurity.com	
  
	
  
Highlights
•  Gain scalable endpoint visibility
•  Quickly contain risk from intrusions
•  Alerts include supporting evidence
•  Validate alerts from SIEM systems
•  Analyze historical network-wide data
•  No agents to install
•  Deploy in minutes for immediate value
•  Reduce security staffing costs
•  No disruption to users
•  Software-as-a-Service (SaaS)
•  Low Total Cost of Ownership (TCO)
Threat Types Detected
•  Known malware
•  New and unknown malware
•  Zero day malware
•  Advanced persistent threats (APT)
•  Injected modules in running processes
•  Rootkits
•  Hacker behavior and system misuse
•  Evidence of malware installation
•  Startup of unknown software
•  Statistical outliers
•  Malware hiding in plain sight
•  Malicious configuration changes
•  Lateral movement
•  Subversion of the operating system

Outlier+Overview

  • 1.
    Agentless Endpoint ThreatDetection and Response OVERVIEW Increased complexity and frequency of attacks elevate the need for enterprise-scale incident response, APT investigations and a rapid forensic response process. Outlier provides comprehensive threat monitoring, alerting and analysis of endpoints, without agents and complex management. Automated Security Analytics The Outlier system continually collects digital evidence from computers throughout your network and applies advanced analytics, incorporating statistical analysis, machine learning algorithms and cloud-based big data threat intelligence. The system not only detects known Indicators of Compromise, but goes further to identify anomalies and statistical outliers to pinpoint new and unknown malware, malicious actions, and suspicious events typical of targeted attacks. A multi-stage reasoning process separates real threats from low-risk indicators and false positives, so incident response teams can focus on critical issues. Alert Reporting and Endpoint Visibility Outlier empowers security professionals to quickly respond to threats and examine suspect computers. Automated alerts conveniently include the underlying contextual evidence for threat verification. The flexible next-generation IOC query subsystem allows ad hoc analysis of network-wide historical endpoint data. Lowest Total Cost of Ownership Delivered as Software-as-a-Service and agentless, Outlier dramatically reduces costs for system implementation and management. Endpoint data collection is passive and has no impact on the user’s experience. Outlier makes your security team more productive. Outlier is an Agentless Endpoint Threat Detection and Response system that automates the best practices of world-class cyber security investigators. It proactively detects new and advanced threats missed by legacy cybersecurity systems, and allows speedy validation of alerts and investigation of incidents. Outlier’s agentless technology removes headaches and costs associated with managing agents. Outlier  Security,  Inc.    |    1150A  Highway  50,    Box  487,  Zephyr  Cove,  NV  89448       Phone:    775-­‐589-­‐2150    |    Email:    info@outliersecurity.com    |    Website:    www.outliersecurity.com     Highlights •  Gain scalable endpoint visibility •  Quickly contain risk from intrusions •  Alerts include supporting evidence •  Validate alerts from SIEM systems •  Analyze historical network-wide data •  No agents to install •  Deploy in minutes for immediate value •  Reduce security staffing costs •  No disruption to users •  Software-as-a-Service (SaaS) •  Low Total Cost of Ownership (TCO) Threat Types Detected •  Known malware •  New and unknown malware •  Zero day malware •  Advanced persistent threats (APT) •  Injected modules in running processes •  Rootkits •  Hacker behavior and system misuse •  Evidence of malware installation •  Startup of unknown software •  Statistical outliers •  Malware hiding in plain sight •  Malicious configuration changes •  Lateral movement •  Subversion of the operating system