XcitiumEssentialsDataSheet V4
XcitiumEssentialsDataSheet V4
XCITIUM
ESSENTIALS
PRE- EM PT I VE, P ROT EC T I V E
RUNTI M E T HR EAT CO NTA I N M ENT
Xcitium Essentials
While no one can stop malware and ransomware from entering your network, XCITIUM’s
Essentials technology prevents cyber attacks from causing any damage with proactive zero-
trust containment of all Unknown files and objects at runtime. Applications running in a
secure Essentials container cannot make permanent changes to other processes, programs,
or data on the ‘real’ endpoint system. This is how to neutralize endpoint attacks without
any productivity or business disruption.
H OW I T WO RKS
Xcitium Essentials employs kernel-level virtualization that allows business endpoints to run
any unknown/untrusted files and applications virtually, in an automated manner, based on
default-deny and/or custom rules and security policies. Essential’s ZeroDwell Containment
feature pre-empts detection-first strategies with automated, breach-free containment. This
means protection is now the first and most powerful line of cyber defense.
Z E RO DW ELL CO N TA I N M E N T - FO OTPR IN T
ZeroDwell technology delivers auto-isolation services that compliment your existing endpoint
protection platform or security posture. This standalone product includes a SaaS management
console, endpoint client agents, service delivery from the Xcitium Threat Research Labs (XTRL),
and the Verdict Cloud engine, a file safety determination service used to assess isolated files
and objects to provide a malicious or safe verdict about contained Unknowns. ZeroDwell is
licensed by the number of endpoints in your organization.
ABSENCE OF ALERT FATIGUE. Businesses are overwhelmed by threat alerts and false positives,
making it almost impossible to identify and investigate genuine unknowns and stealthy threats.
Problem solved: At run time, ZeroDwell Containment simply isolates untrusted, unknown
objects. File verdicts are simple and conclusive. Zero Stress.
FAST, RELIABLE VERDICTING. Analysis and verdicting are automatic, beginning at the moment
of virtualization, to determine whether an unknown object is malicious or benign. The Xcitium
human-led expert security team immediately engages whenever additional analysis or further
event interpretation is needed. Zero Downtime.
SA LES EM A I L V I SI T
US: 646-569-9114 [email protected] 200 Broadacres Drive,
Bloomfield, NJ 07003
CA: 613-686-3060 [email protected]
United States