What is Banyax?
Banyax is a Virtual Cyber Defense Center (VCDC) the latest Information Security concept, it involves all the processes from the ingest and analytics of logs to Incident Response Automated Orchestration. Our VCDC is formed by a team of cybersecurity agents and analysts using next generation tools that apply Machine Learning combined with user and entity behavior analytics that makes easier for our VCDC team to find threats in your systems.
Choosing Banyax as your security service provider will bring you all these benefits.
Correlation and events detection
Advanced Analytics using “Machine Learning”
User & Entity Behavior Analytics
Fraud and Complaint Reporting Hotlines
Automation of responses to security events.
Incident response team.
Scaling and tracking to resolution.
Information Security Risk Management
Information security project management team.
Follow-up to compliance and audits
CISO As a Service
Machine learning models generated to detect incorrect use of credentials &/or access accounts
Special “Watch List”
Discovery / Governance of Access Accounts
“Peer Group Analysis”
Physical Access Analysis
Brute Force Attacks
Users sharing accounts
Illegal Account Creation
Service Accounts Monitoring
Unauthorized Access to Assets
Machine learning models generated to detect and prevent sensitive information or intellectual property leakage.
Email Traffic Peaks to Personal Accounts
Emails sent to competitors
Abnormal access to shared directories or critical files
Sensitive Files Printing.
Special “Watch List” on users prone to risk
Uploading / Downloading information to external sites
High Value Asset Monitoring
Strange “Queries” (results with abnormal size)
Machine learning models generated to detect strange behavior resulting from cyberattacks
Abnormal Processes Execution
Rare DNS Queries
Connections to malicious domains or IPs
Unusual session times or duration of user activity
Robotic Patterns Detection
Input / Output of high volumes of traffic
Unusual traffic by application or port
Machine learning models generated to extend all use cases into the cloud
Cloud Anomalous Access Detection (uploads, downloads)
Data Exfiltration Detection
Ex-employees Accessing Information in the Cloud
Strange Activity by Geo-locality
Abnormal Login Patterns (shared, stolen accounts)
Cloud Unauthorized Access
Cloud Unauthorized Services Execution
Brute Force Attacks