Why Derant


Derant provides efficient network detection and response capabilities to detect and remove cyberthreats. Our customers obtain real-time visibility in their network, which supports them to detect cyber-attacks before it is too late.

We have 15 years of experience in defending sensitive data and critical infrastructure. We recognize ourselves as world-class in-network detection of cyberthreats, which is also why enterprises and public utilities use our SOC services.

With our team of experts and our network detection and response (NDR) platform, we ensure our customers can identify non-signature & unknown anomalies, suspicious patterns based on signatures and customized filters while using machine learning POWERED by human brains.

Services


What we offer

Services

  • Compromise assessments
    It finds even the most advanced hidden hackers who have circumvented your existing defense mechanisms. The outcome for you is that you will get certainty if the network and assets are compromised, and we will provide you documentation with recommendations.
  • Incident response
    Our experts perform all the necessary steps to detain, map extent, analyse consequence. Removing the intruders from your network.
  • Building your SOC
    Tailor the SOC to your company's needs and IT architecture. Onboard and train internal resources while building. Get visibility into what's happening in your IT systems.
  • Managed NDR

    Managed NDR powered by Angle platform, is an easy way for you to obtain full visibility in your network where our security experts proactively detect unknown breaches faster, eliminating blindspots, detect lateral movemement, and respond to sophisticated threats in you infrastructure. We can assist your existing SOC or security team.

    Angle NDR platform

    Angle is a network detection and response platform based on opensource Zeek and Suricata. It is built together with our customers, which is why it makes the organizations more efficient in detecting threats, despite an increasing threat picture, by creating deep insight and visibility into the network traffic and detect the undetected.

    CTF

    BlueTrainer is Derant's CTF platform for training IT-security team and student teams. Our Capture the flag is built to educate and provide deep knowledge in defensive security. You will have the possibility to test your internal capabilities and profiencies to understand how capable you are at handling a potential incident. Our CTF is for everyone working with IT security.

    Platform


    Angle is a network detection and response platform build to detect and suspicious traffic in your network. The platform is based on the leading opensource projects Zeek and Suricata to get the best and most secure solution.

    We have named our platform Angle. We analyze data from different angles to eliminate blind spots, reducing false/positives, reduce the time to detect and identify threats in your network.

    It provides real-time visibility in your network and the ability to respond faster to threats based on our advanced detection algorithms.

    Advanced anomaly, machine learning - Powered by humans’ brains

    How does Angle detect?


    Unparalleled detection of very advanced threats based on several angles of detection

    Advanced Anomaly Detection

    Machine Learning

    Powered by human brains

    Propreitary use cases/rules

    known and Predicted Stuff

    How it works


    The data we use is metadata which is stripped and sent to Angle. The data is modelled by experts and analysed using big data methods and advanced proprietary anomaly algorithms, that identifies suspicious activity in your network deviating from the baseline, as well as compares the data with known, malicious activity and inappropriate traffic in the network. The output is evaluated by our leading security experts as to the character of the threat and what responses are necessary.


    Analyze the data

    The data we use is metadata, which is stripped and sent to Angle cloud by our advanced sensor software. All your connections and data are modeled and analyzed utilizing big data methods, advanced anomaly detection, and evaluated by leading security experts.


    Respond

    Our approach in terms of response is manual. Automation of detection systems has improved substantially but can still be circumvented by humans.

    The platform automatically opens an alarm when it identifies suspicious behavior on your network. Unknown signatures and behaviors are analyzed to conclude what the optimal response is.

    We are combining the best from two worlds, machine learning and human brains.

    Dashboard


    Angle is developed together with our customers, which give you a user-friendly single pane of glass.

    Dashboard

    In the dashboard you can access data easy and fast.

    Analysis tool

    Within minutes start doing forensic, analyse the data and detect the unknown threats, with the possibility of going back in time.

    Filter

    Easily create customized alarms based on your individual specific needs and categorize them.

    Reporting

    The manual burden of creating reports has been removed, the platform enables you to generate a customized report.

    Alarms

    Angle will proactively send you an alarm if something suspicious has been detected at your network.

    Key advantages of Angle platform

    Plug n Play

    Fast implementation, fast startup - Installation in less than one hour!

    Own the data

    Angle can record, extract and store data from live traffic for forensics purposes and to go back in time.

    Scalable

    Self-managed, supported or fully managed Scalable, applicable to multi-site setup

    100% non-intrusive

    Doesn’t influence network performance & Doesn’t create new holes in the security (as in-line solutions)

    Real-time visibility eliminating blind spots

    Provide insights in your complex network environments and IoT, SCADA production.

    Stealthy detection

    Can’t be spotted by attackers.

    SaaS platform

    Customized dashboard, customized reporting for management, automatic alarms and analysis tool.

    Encrypted traffic.

    Detect suspicious patterns in encrypted traffic with behavioural analysis.

    AI/ML Approach.

    Supervised, Anomaly Detection.

    Partner and vendor neutral.

    Angle is independent of network types, system types and manufacturers, meaning that e.g. SCADA production networks can be covered, standard administrative Windows-based networks, etc.

    Resources


    Here you can find different resources to get to know Angle.

    Portfolio Item Image

    NTA has now become NDR

    NTA has now become NDR

    Article

    Portfolio Item Image

    MITRE Derant Angle overview

    MITRE Derant Angle overview

    Article

    Portfolio Item Image

    Angle introduction of platform

    Angle introduction of platform

    Youtube

    Portfolio Item Image

    Angle Alarm Overview

    Angle Alarm Overview

    Youtube

    Portfolio Item Image

    Angle Data Analysis

    Angle Data Analysis

    Youtube

    Portfolio Item Image

    Angle Alarm Trigger

    Angle Alarm Trigger

    Youtube

    Portfolio Item Image

    Network Response Detection

    Network Response Detection

    Website

    Cases


    Contact


    Talk to an expert

    Telephone Number:+45 6177 7318

    Email: info@derant.com