cor. is an integrated stack of advanced security solutions that enable the effective delivery of continuous Cybersecurity Managed Detection & Response services for Enterprises.
cor. Distributed Architecture
cor. distributed architecture allows us to offer scalable monitoring across our client infrastructure regardless of the technology used in their datacenter or remote sites.
cor. Local being deployed at the client site for advanced on-premises correlation and data residency compliance.
A unidirectional threat intelligence feed is pushed from our data centers to cor. Local subscriber allowing the detection of the latest threats occurring world wide.
Event Logs concentrators are deployed in all remote sites with a high ratio compression before sending it to the main cor. appliance for events correlation, minimizing the impact on the client's inter-site bandwidth.
cor. Architecture Characteristics
Engineered for scalable deployments
Engineered around Technology, Tools and Processes
Data Residency Compliance
Unidirectional Threat Intelligence feed towards cor. Local
Log transfers using High Compression Ratio
Optimized for large deployements
Attacks involving cryptojacking increased by 8,500 percent in 2017.
of all email is spam and viruses
Clicking links within email accounted for 88% of all reported phishing
There are over 130 large-scale, targeted breaches in the U.S. per year, and that number is growing by 27% per year
The average cost of a malware attack on a company is $2.4 million
Ransomware damage costs exceed $5 billion in 2017, 15 times the cost in 2015.