Leviathan Security Lotan
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Enhance Staff Productivity

Reduce Costs

Leviathan Security Lotan

Innovative Threat Detection and Analysis

Description

Lotan™ provides your enterprise with the unique capability to detect attacks earlier, and with greater confidence. The fragility of exploits in the face of modern countermeasures and environment heterogeneity often leads to application crashes. Lotan analyzes these crashes to detect the attack and aid the response. Lotan collects crashes using either a simple registry change on Windows, or a small userland application for Linux. A RESTful API allows you to share evidence and conclusions with your existing Threat Defense and SIEM solutions. The API provides insight into each step of Lotan's workflow, including detailed information required to understand and respond to the threat rapidly. Lotan relies on a patent-pending instruction set emulator and classifiers to detect the following exploitation methods and artifacts:
  • Heap Spray
  • Return-Oriented Programming
  • Jump-Oriented Programming
  • Corrupted Virtual Pointer
  • JIT Spray
  • Self-Modifying Code
  • Use After Free
  • Call Frame Alignment
  • Corrupted Function Pointer
  • Temporal Anomalies
  • Stack Pivots
  • Known-Malicious Code
Highlights
  • Automatically detect exploitation of both known and unknown vulnerabilities
  •  

  • Decrease incident response time
  •  

  • Increase insight into the health of your network and systems
  •  

  • Automate event response with confidence
  •  

Lotan greatly increases the accuracy, rate, and speed with which threats are detected, and impedes the ability of adversaries to operate undetected within your network.

Scheme of work

 Scheme of work