Investigation tools
Investigate quickly and effectively to qualify security events and make the right decisions at the right time.
In addition to all available telemetry, collect data and artifacts on endpoints to run accurate and effective investigations to qualify threats (cybercrime, advanced persistent attacks) and implement remediation measures.
Launch jobs to perform actions on one or more endpoints, and analyze the results directly from your console:
- RAM capture
- Running processes capture
- Driver information retrieval
- Detailed endpoints structure visualization
- Endpoint’s network communications exploration
- Threat persistence detection (registries, scheduled tasks, startup files, etc.)
Use your AI assistant Kio to contextualize Security Events, and to ease and speed up investigations in natural language.
Kio is based on an open-source model deployed within our secured infrastructure, ensuring full control over data.
Preconfigure job templates by combining different tasks to speed up investigations.
Based on jobs that have already been launched
or ad hoc jobs, they are ready to be activated on endpoints, groups of endpoints, or your entire workspace:
- Scans launch
- Data collection
- Remediation actions
- And more
Find out more
EDR with remediation tools
The crucial role of analysts for investigations in cybersecurity
Why the role of cyber experts remains essential in the event of an attack – even with automation tools -,…
Artificial Intelligence in an EDR, for what purpose?
EDR and cybersecurity – the benefits of AI: how to contain risk upstream, thanks to an engine that runs directly…