2018 AtomicEye (Combined) - Nehemiah Security

Minimize Your Attack Surface, Maximize Business Efficiency

AtomicEye ASM continuously scans your endpoints at a granular level. Detect vulnerabilities instantaneously and execute remediation immediately with absolutely no human involvement.

TRY NOW

How AtomicEye ASM Works

Continuous Asset inventory

An intelligent agent installed on every authorized device continually inventories all software and operating systems, providing uninterrupted visibility.

Configuration Management and Remediation

ASM identifies, tracks, and timestamps changes—including unauthorized downloads, communications, and executables. When configuration violations are detected or security controls are violated, remediation is automatic.

Control Enforcement

ASM enforces controls on every system across the entire organization, worldwide. Plus, customize critical security and compliance audit controls by device group, including application security.

Real-Time, Automated Threat Detection

AtomicEye CP detects, prevents, and remediates attacks as they are happening, even in volatile memory, without relying on signatures of any kind.

TRY NOW

How AtomicEye CP Works

File Detection

Using advanced algorithms and machine learning, CP is able to detect—with certainty, in real time—the presence of malicious files: APTs, zero-days, rootkits, and targeted attacks. No signatures, whitelists, or any other form of prior knowledge is needed.

Behavior Detection

Inventories all behaviors of all running processes across all endpoints and utilizes machine learning to establish 'normal' behavior for those processes. This empowers each agent to recognize anomalous behaviors of processes without rules or prior knowledge.

Automated Remediation

CP deploys granular scanning, change detection, machine learning, and patented algorithms to contextually remediate. The offending executable is stopped, altered configuration settings are repaired, open ports are closed, and deleted or corrupted files are restored. The infected asset is restored back to its original, pre-attack state, without the need to re-image or interrupt business operations.

See AtomicEye in Action

 
 

DOWNLOAD SOLUTION SHEET


"AtomicEye ASM has saved us an incredible amount of time and effort in implementing configuration standards and auditing for compliance throughout our environment. It has given us a level of visibility we simply did not have before."

Senior VP IT, Mid-Sized Bank

DOWNLOAD SOLUTION SHEET


"With AtomicEye CP, I feel bullet proof. Moreover, I have experienced on many occasions the benefit of being able to surgically repair my systems without having to re-image a machine or take anything offline."

Director of Technology, West Coast Financial Institution