Cyber incidents continue to increase, as malicious actors employ unprecedented sophistication and scale to penetrate organizational networks. These attacks typically utilize technologies that bypass standard perimeter defenses. Perpetrators can plant highly engineered malicious software to extract data and manipulate systems, undetected by traditional sensors.
Kivu has developed a proprietary technology tool, Kivu Enterprise Collection Tool (KECT), which can scan IT systems remotely to collect forensic data. KECT was engineered to efficiently and effectively identify the Indicators of Compromise (IOC), enabling Kivu analysts to quickly identify and resolve cyber incidents.
KECT is secure, self-contained and fast. It does not install any software on the client’s systems or restrict bandwidth. KECT works by scanning networks to collect the most valuable data points, and then immediately responds with statistical analysis at a secure centralized location. KECT is able to vigilantly monitor the changing Tactics, Techniques and Procedures (TTP) used by the most sophisticated attackers.
What KECT offers Kivu’s clients:
- Lower incident response costs – Because all necessary data is collected remotely, no onsite Kivu personnel are required
- Fast analysis – KECT can scan large corporate networks in less than 60 minutes
- Low client impact – KECT requires no software installation at the client site, nor calibration, and it uses minimal bandwidth consumption
- Highly effective solutions – KECT isolates previously unidentified Indicators of Compromise to reveal exploited vulnerabilities
Kivu is constantly innovating, bringing the best solutions in both technology and analytic processes to our clients throughout the globe.