comprehensive Security Platform Management

SM-Hunter provides a security solution capable of monitoring your infrastructure, Endpoint Detection and Response (EDR), detecting threats, intrusion attempts, system anomalies, poorly configured applications and unauthorized user actions. It also provides a framework for incident response and regulatory compliance.

More Information
SM-Hunter comprehensive Security Platform SM-EDR Hunter
(EDR) SM-Hunter Endpoint Detection and Response

SM-Hunter inscription the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility with the insights to assist security analyst’s discovery, investigation and response to threats attack campaigns across multiple endpoints. SM-Hunter helps detect hidden exploit processes that are more complex than a simple signature pattern and can be used to evade traditional antivirus systems. In addition, the SM-Hunter agent provides active response capabilities to block a network attack and stop a malicious process or quarantine a malware infected file.

Security Analytics

SM-Hunter is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis.

falcon overwatch detection highlights
Intrusion Detection

SM-Hunter agents scan the monitored systems looking for malware, rootkits and suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses. In addition to agent capabilities, the server component uses a signature-based approach to intrusion detection, using its regular expression engine to analyze collected log data and look for indicators of compromise.

File Integrity Monitoring

SM-Hunter monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on. In addition, it natively identifies users and applications used to create or modify files. File integrity monitoring capabilities can be used in combination with threat intelligence to identify threats or compromised hosts. In addition, several regulatory compliance standards, such as PCI DSS, require it.

Vulnerability Detection

SM-Hunter agents pull software inventory data and send this information to the server, where it is correlated with continuously updated CVE (Common Vulnerabilities and Exposure) databases, in order to identify well-known vulnerable software. Automated vulnerability assessment helps you find the weak spots in your critical assets and take corrective action before attackers exploit them to sabotage your business or steal confidential data.

Regulatory Compliance

SM-Hunter provides some of the necessary security controls to become compliant with industry standards and regulations. These features, combined with its scalability and multi-platform support help organizations meet technical compliance requirements. SM-Hunter is widely used by payment processing companies and financial institutions to meet PCI DSS (Payment Card Industry Data Security Standard) requirements. Its web user interface provides reports and dashboards that can help with this and other regulations (e.g. GPG13 or GDPR)

Configuration Assessment

SM-Hunter monitors system and application configuration settings to ensure they are compliant with your security policies, standards and/or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured. Additionally, configuration checks can be customized, tailoring them to properly align with your organization. Alerts include recommendations for better configuration, references and mapping with regulatory compliance.

Incident Response

SM-Hunter provides out-of-the-box active responses to perform various countermeasures to address active threats, such as blocking access to a system from the threat source when certain criteria are met. In addition, SM-Hunter can be used to remotely run commands or system queries, identifying indicators of compromise (IOCs) and helping perform other live forensics or incident response tasks.

SM-Hunter comprehensive Security Platform

  • Security Analysis
  • Intrusion Detection
  • Intrusion Detection
  • Incident Response

Contact Us