

RazorThreat Vision
Real-time Threat Visualization
Seeing is knowing
RazorThreat Vision
RazorThreat has developed a new, different approach to dealing with the ever increasing targeted, financially motivated threats attacking businesses and governments everyday. RazorThreat's Visionâ„¢ provides unprecedented Visibility into all allowed network activity, regardless of origin or volume, affecting High Value Assets and puts any Unknown or Unauthorized activity into Context for immediate Action.
RazorThreat Visionâ„¢ ("Vision") provides visibility into who/what is accessing your high value assets and who/what your high values are communicating with. RazorThreat Visionâ„¢ validates existing security topologies, detects unauthorized activity as it occurs on the network, provides information to re-arm existing security products increasing their performance and reducing the latency (Risk) existing today between the time of detection and remediation which increases overall network security. RazorThreat Visionâ„¢ detects malicous customized, zero-day, inane, and unauthorized activity whether it originated inside or outside of the organization.
Simply stated, Vision enhances the effectiveness of your existing security products by providing enhanced visibility of all network activity - known and unknown, authorized and unauthorized, external and internal - validating existing permissions, detecting and identifying potential threats, alerting personnel to issues and providing the information to re-arm event driven security platforms to enhance internal controls to meet today's threats.
RazorThreat's Visionâ„¢ is uniquely positioned to compliment defense-in-depth architectures that include firewalls, IDS/IPS, anti-spam, anti-virus, web filtering, SIM, SEM and SIEM systems and plugs into existing network delivery platforms. Vision provides an in-depth analysis on the data these systems analyze and pass as "good". This analysis detects the targeted, customized, zero-day attacks that are contained in "good" data.
Visibility
RazorThreat Visionâ„¢ tools and methodologies are utilized to establish Positive Network Control and visibility of all network activity. Overall risk is reduced by providing early detection and isolation of Unknown and Unauthorized activities at initial occurrence.
Context
RazorThreat's proven technology analyzes all network activity, identifies any unauthorized or unknown network activity and puts it into context for review reducing the latency between detection and action taken.
Action
Each unauthorized and unknown activity is logged for review with RazorThreat's interactive tools. There are four options for actions to be taken - Authorize, Investigate, Monitor or Remediate. All actions are fully documented with full visibility into items to be investigated or monitored.