0% found this document useful (0 votes)
86 views2 pages

2019 4 Verint Luminar Brochure

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views2 pages

2019 4 Verint Luminar Brochure

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

!

WannaCry

Bad Rabbit
APT 38 - Target sectors:
Financial
!

LUMINAR
CYBER THREAT INTELLIGENCE
TARGETED THREAT INTELLIGENCE TO PRIORITIZE RISKS AND
ANTICIPATE CYBER-ATTACKS
Verint’s Luminar empowers organizations to build and maintain a proactive CTI operation that
enables to anticipate and mitigate cyber threats, reduce risk and enhance security resilience.
Luminar provides the most targeted Cyber Threat Intelligence (CTI), combining extensive data
collection, with historical intelligence, and over 25 years of domain expertise in designing and
developing intelligence solutions and services.

Threat Intelligence-Driven Approach


Extend Visibility Beyond the
Organization Regional
Proactive

Luminar provides External Threat Intelligence (ETI),


enabling organizations to take a proactive approach
to threat hunting, with knowledge and understanding Industry
of where attackers are, what tools they use and
what they are planning.
Targeted
Unmatched Real-Time Data Collection
Luminar automatically harvests and ingests data Customer
from open and covert web sources, based on the Inward
organization’s industry, critical assets and pre- Looking
defined threat hunting requirements, to provide
an accurate and timely understanding of threats.
Crawling surface, deep and dark web sites, as well
Maturity
as closed forums, social networks and messaging
platforms, Luminar exposes malicious activities at Key Benefits
the earliest stages, with unprecedented accuracy.
Classify threats and vulnerability management
to improve decision making
Human Enriched Intelligence
Fluent in over 20 languages, including Russian, Detect unknown attacks with information
Chinese, Farsi, Arabic, European languages and about emerging malware
more, Verint’s analysts cover different domain
expertise, including financial crime, hacktivism, Accelerate incident response with insights
cyber-terrorism, nation-state and more, to create the into attackers’ identities, motives, and methods
most comprehensive threat intelligence analysis and Unfolding Attacks in the Making
customized actionable reports that are continuously Luminar ensures early discovery of planned and
fed in the system. ongoing campaigns, exploit and vulnerability
Seamless Access to Finished and Historical commerce, indicators of system breach & data
Intelligence leaks and more, that target the customer.
Luminar cross references any customer threat finding, Customer-Centric Live Monitoring Plan
with a unique threat intelligence repository of The Luminar “live” monitoring plan is customer-centric
over 10 years, providing access to historical as well and is continuously updated with specific threat
as finished intelligence, according to industry, topic, intelligence feeds, based on keywords, high-risk
attack group and more, to tailor the most accurate personnel, critical assets, brands, systems and more.
and comprehensive threat intelligence analysis.

Amplified Defense Eco-System


Proactive Defense and and Readiness
Actionable Intelligence Luminar was designed to fit any organization’s
Luminar delivers custom-made, actionable threat requirements and can be deployed on premises,
intelligence, based on the customer’s pre-defined or operated remotely, in a SaaS model.
needs and assets, in a timely manner, to enable
Luminar covers the full intelligence life-cycle,
the organization prepare for attacks ahead of time.
leveraging the existing security eco-system and easily
This customer-centric approach to threat intelligence integrating with other security tools. Its flexibility and
ensures a better understanding of the current and openness enable to automatically deliver intelligence
future threat landscape, enabling to better anticipate updates to strengthen the organization overall
and mitigate targeted threats. security infrastructure.

Unmatched Real-Time Customer- Unified Intelligence


Data Collection Centric Approach in a Single Platform
Intelligence hub
Personalized monitoring plan Customized dashboards

Domain monitoring
Access to finished and
Open web monitoring Extraction entity historical intelligence

Technical intelligence 24/7 Monitoring & alerting


Automated workflows
Deep & dark web monitoring Threat actor analysis &
profiling
IOC & CVE data Customized enrichment engine
Analytics engine
Social networks monitoring
LUMINAR _ONEPAGER_ EN_APR_ 2019

Live, real-time coverage


Collaboration and sharing
Mobile apps monitoring

Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Verint is strictly prohibited. By providing this document, Verint Systems
Inc. is not making any representations regarding the correctness or completeness of its contents and reserves the right to alter this document at any time without notice. Features listed
in this document are subject to change. Not all functionality is available in all configurations. Please contact Verint for current product features and specifications. All marks referenced
herein with the ® or TM symbol are registered trademarks or trademarks of Verint or its subsidiaries.

All rights reserved. All other marks are trademarks of their respective owners.

You might also like