The new generation of Cyber experts is here!

Performance is always a prerequisite, transparency an obligation

#01

We don't replace analysts, we enhance their capabilities

We don’t sell dreams, we don’t sell revolution.

Having participated in the rise of cyber in France, we know only too well that technology is important, but the human element will always be necessary. That’s why we focus on supporting the work of analysts.

Our goal

Put their knowledge and expertise to work
and expertise for the benefit of your organization

  • during the EDR setup
  • during supervision
  • during remediation
#02

We don't prevent breaches, we improve your resilience

Providing the means to block attacks is an imperative but it’s the bare minimum.

An EDR must give you all the contextual elements linked to security events. Every organization needs to understand what happened, how it happened and what was done to stop the threat.

Only then can your company’s resilience be improved.

OUR DIFFERENTIATOR:

We’ve chosen to build our solution around widely recognized, open formats. The good news is that you can find these rules categorized in the MITRE ATT&CK matrix. The benefit to you is twofold :

  • make doubt elimination child's play and reduce analyst fatigue
  • understand the techniques most commonly used by attackers and guide your team's prioritization efforts.
Why HarfangLab
#03

We don't provide THE solution, we enable you to compose the one you need

We’re not in the best position to identify your cyber roadmap. You are!

Who else but you has the insight into your organization’s context, its maturity and the means at your disposal to combat cyber risks?

OUR POSITIONING :

  • help you implement your strategy by offering you the best connectors on the market
  • enable you to reconcile analyst relevance with independence from suppliers
#04

"We don't do AI", we respond to use cases with mathematical models

Let’s face it, AI is a bit of a pie in the sky when it comes to tech solutions. So much so, in fact, that we’re still reluctant to say we’re doing anything about it.

Our aim is not to create AI, but to provide the best possible response to your needs. In short, we focus on identifying use cases and responding to them in the most relevant way. SomSMBmes (and more and more often) this means using mathematical models.

To improve responsiveness, and therefore safety, we have managed to deploy all these models directly in our agents.

OUR AI MODELS :

hibou
Hibou model Deep Learning
Predicts the probability of a file being malicious
chocard
Chocard model Machine Learning
Detects malicious PowerShell scripts
condor
Condor model Machine Learning
Detects malicious executable files

OUR RESULTS :

  • Shikitega, the “particularly stealthy” malware discovered by AT&T Cybersecurity.
  • Symbiote, the “virtually undetectable threat” discovered by BlackBerry.

And many other types of malware for which no one dares to question their stealth.

#05

We don't protect your endpoints, we maintain your company's production capacity

You’re not just there to protect your organization. Your mission is much broader.

The CISO’s mission is to ensure the continuity of the company. To ensure that the business can continue to operate in the future.

To do this, they need to be able to work properly today. In other words, endpoint security must be achieved without any impact on the business.

Our impact on the business :

  • ~130 MB RAM
  • 0,5% CPU
  • NO DEVICE RESTART
#06

We don't offer MDR, we entrust the monitoring of our EDR to partners who know you

For competitors, it’s an advantage to have developed the solution to manage it for the benefit of its customers.

No doubt, but to whose benefit?

The knowledge accumulated by our partners through contacts with companies similar to yours is a major asset for your protection.

Our approach:

Aware that it’s utopian to think that a supplier can adequately meet the specific needs of every organization, we work with partners to enable you to choose an offer that matches your requirements.