TOP

ZombieZERO XDR

AI-based Extended Detection and Automated Threat
Determination Response Solution, ZombieZERO XDR
SCROLL

ZombieZERO XDR integrates and extends all security components,
including endpoints,
within a detection framework to detect the essence of threats.
By combining active data collection and automated threat determination technology (AI-TIP),
it is a next-generation platform that enables to automatically determine and
response to security threats
without the need for specialized analysts.

Features
  • icon

    promptitude

    Possible to respond quickly and accurately to threats even with non-professional / limited personnel

    1. • Correlate data sources to reduce average time to detection
    2. • Accelerate classification, reduce investigation and scoping time to reduce average investigation time
    3. • Reduce average response time by implementing simple, fast and highly relevant automation
  • icon

    visibility

    Enabling to establish Cyber Kill Chain strategies by ensuring visibility of anticipated threats

    1. • Collects all events occurring in endpoints and networks
    2. • Enhance visibility into overall security, not individual solutions
    3. • In the event of a cyber attack, enable situational awareness and response determination on attack through integrated analysis
Main Function
Classification of Functions
Implementation Method
  • icon

    Threat Determination

    Auto
  • icon

    Countermeasures

    Auto
  • icon

    Threat Case Management

    Auto
  • icon

    Compromise Threat Investigation

    Auto Analysis
  • icon

    Attacker Identification

    Auto Analysis
  • icon

    Attack Type Classification

    Auto Analysis
  • icon

    Data Collection

    Endpoint / Network / Security Device
  • icon

    Threat Intelligence
    Generation

    Providing
    [Incident information, Similarity of malware,
    Threat site prediction, Attack technique, Attack group]
    based on Threat Hunting
Implementation of ZombieZERO XDR features
Enabling active response by integrating key components of
security management automation and combining AI and TIP technology
img
Conceptual diagram of ZombieZERO XDR
img
Results of Implementation
  • icon

    Minimizing time, personnel, and cost through increased efficiency of Security Operations Center (SOC)

  • icon

    Protecting enterprises from security threats by reducing business risks

  • icon

    Enabling prevention, mitigation, detection, investigation, and response capabilities against threats

Target of Implementation
  • img

    Institutions/enterprises that require continuous monitoring of multiple security devices

  • img

    Institutions/enterprises that require incident root cause analysis and the establishment of potential security incident response strategies

  • img

    Institutions/enterprises that need to establish a response process tailored to security targets

  • img

    Institutions/enterprises that require efficient roles of security personnel

Use cases of ZombieZERO XDR
img
Application Areas

ZombieZERO XDR is a next-generation security control product implemented in the security environments
of institutions and enterprises.
It combines proactive information collection, SOAR
(Security Orchestration, Automation, and Response), NDR (Network Detection and Response),
and EDR (Endpoint Detection and Response) functionalities
to effectively automate threat detection and response.
It also incorporates advanced threat detection technology and enables advanced threat response, making it an
extended security solution capable of addressing sophisticated threats

Service name Demand Delivery method Users
Zombie
XDR
Domestic and foreign institutions Security Control Service
integrating with CTI
Professional Security
Control Service Provider
Domestic and foreign enterprises
Threat
Intelligence
DATA Platform
Domestic and foreign institutions Service through portal establishment Security control provider,
Information security operation center,
corporate security manager,
Incident (compromise) response analysis center
Domestic and foreign companies
Non-profit user [Free opening through identity verification]
White hackers, Non-profit information security research institutes,
Information security educational institutions, schools, etc.