Upon detecting an anomalous session, Yaxa’s automated Incident response mechanism triggers an authentication request to vet the user in real-time. Flexible policy allows administrators to customize profiles based on perceived threat, risk sensitivity, and user privileges. YAXA can distribute an authentication request to an individual user, manager or multiple persons based on company policy.
Yaxa constantly incorporates user feedback into behavioral models in order to adapt to changing user behavior and risk patterns. With such unsupervised and adaptive learning, Yaxa is able to reduce future alerts while responding to ever changing threat landscape.
Real time
Rather than rely on forensics and retrospective analysis, Yaxa provides automated incident response to thwart an insider attack once detected.
Beyond perimeter defenses
Firewall /IPS/ IDS, being signature-based solutions designed to keep attackers out of the network, cannot deal with Insider threats which only Yaxa can combat successfully.
Effective against Zero-Day Vulnerabilities
Yaxa solution is identity aware and uses advanced Machine Learning algorithms to detect hitherto unknown vulnerabilities.
Flexible deployment
The Yaxa appliance can be deployed either in Data-Centre or in the Cloud.
Monitors the network traffic and leverages Big Data
Yaxa collects and analyses packet headers/meta data as it monitors HTTP/HTTPS traffic and indexes the data to make it more easily and efficiently searchable for various decisions.
Eliminate false alarm
Yaxa reduces the need for IT intervention manually by taking corrective action automatically upon anomaly detection and policy violation.
Human attack surface by 2021
Average security alerts per day
Percent of network traffic is encrypted
Yaxa can provide a demo for your custom/internal application or SaaS applications like SalesForce, Office365, DropBox, Gmail, Box and other web based applications.