top of page
Neon Painted Face

PRODUCTS / SECURITY

Image by Markus Spiske

CYBERSTALKER

PRODUCTS / SECURITY

We are proud to announce our bespoke personal security software to provide cyber security and data protection to its users.

CyberStalker is an innovative and multilevel real time threat prevention system for corporate digital infrastructure.

CyberStalker's key features are...

INTELLIGENCE

Exclusive intelligence information supplied by A-Soft provides insights into new cybercrime programs and tools and modifications of well-known viruses and criminal tactics.

FORENSICS

A-Soft forensics laboratory analysts provide you with comprehensive data on the most advanced malware targeting our customers.

MACHINE LEARNING

Detecting unknown threats using machine learning technology based on advanced behaviour traffic analysis and machine learning algorithms and patterns.

90%

of data received is from non-public sources.

150,000+

of criminal groups and individual hackers.

75%

of all high-tech crimes are supported by our cyber task force.

HOW IT WORKS

CYBERSTALKER

The Traffic Analysis Sensor system detects infected machines and their connections to C&C servers based on malicious rules and signatures.

Identifies network anomalies generated by malicious programmes using machine learning algorithms.

CyberStalker integrates with our behaviour analysis system in order to detect unknown malicious code.

It transfers information about incidents to A-Soft SOC on a secure channel to any corporate SIEM or log storage system.

Events are classified in the A-Soft cloud data center. Events are always manually analysed by our experts.

SOC experts notify your security staff about critical threats via phone and email with all analysis and results available via a convenient web interface.

Image by Nina Ž.

CyberStalker has several variations that can be implemented separately or as one multilevel system:

CyberStalker Server

CyberStalker Cloud

CyberStalker Network

CyberStalker PC

CyberStalker Mobile

All of the CyberStalker options include the following:

Deep knowledge of advanced threats, forensic competencies, vast array of experience and implementation of global best practices in incident responses.

On-site investigation by a mobile response team.

Forensic specialists and analysts can examine endpoints, network traffic and other points of

compromise to completely eliminate threats and collect digital evidence.

Prompt response from our team

It only takes 10 minutes to resolve the majority

of issues. A convenient ticket system guarantees

that all questions will be answered.

CLOUD INTERFACE

ALL INCIDENTS ARE AVAILABLE VIA A CONVENIENT WEB INTERFACE IN REALT TIME.

INFORMATIVE REPORTS

Detailed reports can be filtered by time and event type enabling you to easily control and analyze the dynamics of attacks.

INTEGRATION WITH SIEM & LOG STORAGE SYSTEMS

The event flow detected by a TDS sensor can be automatically sent to any SIEM or log storage system via the syslog protocol.

Useful Links

Home

Products

Services

News

Contact Us

Visit Our Office

05-15, 13A/F, South Tower,

World Finance CTR.,

Harbour City, 17 Canton Rd.T,

Hong Kong

Get In Touch

+852 3978 5148

office@a-soft.io

+852 3978 5000

© A-SOFT LIMITED 2020
bottom of page