– The solution is designed to be triggered before any malicious business logic
takes place. For example, as soon as a file is accessed, downloaded on to a
device, or malicious code injection is fully executed.
– Once the solution is activated, it autonomously analyzes and makes decisions
on prevention and alerts, regardless of human involvement and Internet
connectivity. If a human is involved it’s not a real-time offering.
– Any new data artefact or file must be analyzed in a matter of milliseconds,
prior to being executed, opened or causing compromise, effectively providing a
threats – The solution’s design should cover a broad range of cyberattack
vectors and surfaces, both known and unknown threats.
environments – the solution should protect a wide range of OSs and environments,
be it networks, endpoints, mobile devices or servers, from a single unified