SecurityMatters is now part of 
SecurityMatters is now part of 


SilentDefense version 3.13

Going Toward Active Cyber Security

SilentDefense™ 3.13 offers unprecedented visibility, proactive threat hunting capabilities and detailed vulnerability analysis.This version of SilentDefense™has been designed to help users to implement a robust cyber defense strategy based on the proactive exploitation of intelligence information. The new features and benefits include:

Threat Intelligence Ingestion

For a rapid and continuous protection against any cyber threats. The ingestion of Indicators of Compromise (IOCs) in Structured Threat Information eXpression (STIX™) empowers enterprise-grade customers for integration at scale with complex security infrastructures.

Social-SilentDefense3.13-3.png
Social-SilentDefense3.13-1.png

Forensic Time Machine

Lets users perform automatic, back-in-time threat searches and individuation of past compromises. After digestion of cyber threat intelligence information and new Indicators of Compromise, SilentDefense™ will scan the last 3 months (or more depending on configuration) of system events and traffic to determine if the represented threats were previously seen within the ICS network.

Multi-Factor File Dissection

Effectively extracts and analyzes files using rule-based analysis, (such as YARA and proprietary malicious hashes) to conduct multi-module threat detection and enable quick remediation actions. Additionally, thanks to the SecurityMatters IT/OT integration capability, users can send files to any 3rd party analysis technology for automatic active response.

Social-SilentDefense3.13-2.png
Social-SilentDefense3.13-3.png

Threat Intelligence Ingestion

For a rapid and continuous protection against any cyber threats. The ingestion of Indicators of Compromise (IOCs) in Structured Threat Information eXpression (STIX™) empowers enterprise-grade customers for integration at scale with complex security infrastructures.

Social-SilentDefense3.13-1.png

Forensic Time Machine

Lets users perform automatic, back-in-time threat searches and individuation of past compromises. After digestion of cyber threat intelligence information and new Indicators of Compromise, SilentDefense™ will scan the last 3 months (or more depending on configuration) of system events and traffic to determine if the represented threats were previously seen within the ICS network.

Social-SilentDefense3.13-2.png

Multi-Factor File Dissection

Effectively extracts and analyzes files using rule-based analysis, (such as YARA and proprietary malicious hashes) to conduct multi-module threat detection and enable quick remediation actions. Additionally, thanks to the SecurityMatters IT/OT integration capability, users can send files to any 3rd party analysis technology for automatic active response.

And more...

  • Extended Network Authentication Analysis

    Boosted to identify, monitor and correlate user behavior within the host network with anomalous activity. SilentDefense™ extends continuous detection of authenticated users on the network to open innovative investigation scenarios.

  • Augmented Threat Library and Protocol Support

    SilentDefense™now has the richest industrial threat and vulnerability management capability available today. It includes over 1,600 ICS-specific threat indicators, known threat profiles and operational errors, protocol anomalies, vulnerabilities and CVEs. In addition, SilentDefense™reached the ambitious goal of supporting more than 100 IT/OT protocols.

  • Improved Assessment and Analyst Collaboration Tools

    SilentDefense™ achieves ease-of-use and seamless integration in the asset owner’s risk management and operational processes. SecurityMatters focused on improving characteristics like real-time collaboration, sharing of information and dashboards between analysts, and easier ingestion of offline network traffic files(PCAP) from customer networks for plug and play assessment

Version 3.13 will be available to customers worldwide from Thursday October 18, 2018.

To know more download SilentDefense Datasheet or check out our Solutions Brief.

Request a Demo