CSI: ACE Insight

A CyberSecurity Intelligence (CSI)


E.g.: 10.1.16.32,
http://www.domain.com,
http://www.domain.com/sub/sub/sub.html,
http://www.pathtofile.com/file.exe
Url contains invalid format or characters 5 reports remaining CSI ACE Insight is a tool for assessing the current state and risk level of a web link or IP address.
CSI ACE Insight performs real-time content analysis, and then displays a report of its findings.

Files are analyzed in the Forcepoint Advanced Malware Detection™ tool, a sandbox that identifies threats and, if applicable, provides forensic details on a file's infection and post-infection behavior. File submission methods and sandboxing results vary according to user access level:

  • All Levels: The Advanced Malware Detection tool is activated whenever a link submitted to CSI ACE Insight initiates a file download.
  • Level 1 & 2: Only web-based files can be submitted to the Advanced Malware Detection tool, under the "Enter a URL/IP Address" tab. A CSI ACE Insight report is generated after analysis, indicating the severity level of any threat detected.
  • Level 3: Local files and web-based files can be submitted to the Advanced Malware Detection tool, under the "Upload a File" tab or "Enter a URL/IP Address" tab, respectively. A complete ACE Insight Report is generated after analysis, indicating the severity level of any threat detected, as well as describing any activities found in processes, the registry, and other areas of the computer.

Welcome Guest

Login

Your current level of access:

Latest from X-Labs Blog

    

Using Hardware Logic to Protect Critical Infrastructure

November 28, 2022

Welcome to the fourth post from Forcepoint's 2023 Future Insights series , which offers insights and predictions on cybersecurity that may become pressing concerns in 2023. Here's the next post from Dr. Simon Wiseman , Chief Technology Officer, G2CI:

 
    

How agencies are moving zero trust from aspiration to transformation

November 21, 2022

Editor's Note: The following is a repost of a sponsored post that originally appeared at FedScoop.com :

 
    

Zero Trust Web Access: Making it easy to extend Zero Trust to web access with Forcepoint ONE

November 17, 2022

When people talk about implementing Zero Trust, often it starts with breaking things down into two main categories, ‘Resources’ and ‘Users.’ Makes sense, since it is the interaction between users and resources that must be secured with Zero Trust controls. Conversations used to start with a pre-determined focus on the internal network. As such, things primarily revolved around implementing network...