Confluera combines behavioral analytics and ML powered anomaly detections to detect a broad spectrum of suspicious host and network behaviors in real time. What makes it special is the noise reduction and low false positives to intercept threats ‘that matter’ , thanks to the continuous attack graph approach.
Confluera continuously gathers granular events on workloads spanning VM instances, containers, user, network, and authentication activity-enabling powerful searches for malware, IOCs, or hidden attackers.
Searching for new threat intel, suspicious events, users, and assets should be the starting point for threat hunting. For any event, Confluera lets you go further to the storyboard of all other suspicious and benign activities to assess the full impact that happened in the context of that event. In other words, threat hunters only need to point to a thread, and Confluera will pull it and unravel the yarn for you.
When it comes to threat hunting, every second counts. Thanks to the petabyte-scale OLAP platform optimized for real-time hunting, each workload event is available for threat hunting within seconds.