CSI: ACE Insight

A CyberSecurity Intelligence (CSI)


E.g.: 10.1.16.32,
http://www.domain.com,
http://www.domain.com/sub/sub/sub.html,
http://www.pathtofile.com/file.exe
Url contains invalid format or characters 5 reports remaining CSI ACE Insight is a tool for assessing the current state and risk level of a web link or IP address.
CSI ACE Insight performs real-time content analysis, and then displays a report of its findings.

Files are analyzed in the Forcepoint Advanced Malware Detection™ tool, a sandbox that identifies threats and, if applicable, provides forensic details on a file's infection and post-infection behavior. File submission methods and sandboxing results vary according to user access level:

  • All Levels: The Advanced Malware Detection tool is activated whenever a link submitted to CSI ACE Insight initiates a file download.
  • Level 1 & 2: Only web-based files can be submitted to the Advanced Malware Detection tool, under the "Enter a URL/IP Address" tab. A CSI ACE Insight report is generated after analysis, indicating the severity level of any threat detected.
  • Level 3: Local files and web-based files can be submitted to the Advanced Malware Detection tool, under the "Upload a File" tab or "Enter a URL/IP Address" tab, respectively. A complete ACE Insight Report is generated after analysis, indicating the severity level of any threat detected, as well as describing any activities found in processes, the registry, and other areas of the computer.

Welcome Guest

Login

Your current level of access:

Latest from X-Labs Blog

    

Forcepoint NGFW MITRE ATT&CK simulation

July 28, 2021

To illustrate Forcepoint’s NGFW advanced intrusion detection capabilities, I thought it might be helpful to simulate a kill chain attack to highlight layers of defense.

 
    

Democratizing Security Intelligence with Forcepoint Dynamic Intelligence Manager

July 27, 2021

A recent survey of cybersecurity and IT professionals uncovered that 78% of organizations use more than 50 different cybersecurity products to address their security goals and protect their resources. Within a few days another survey further highlighted that 86% of organizations rely on up to 20 security vendors . I’m not going to debate if these numbers are too big...

 
    

EO 14028 is “right on time,” but challenges remain in race to develop software

July 26, 2021

The Biden Administration’s Cybersecurity Order (also known as EO 14028) is a welcome development. Not long after it was introduced, Petko offered perspective on the Zero Trust aspect. Now, there's more to talk about.