CCG’s suite of security products are integrated around Phen, a human intelligence in silicon. This provides cognitive analytics, continuous diagnostics, and mitigation. CCG’s cybersecurity products are providing cutting edge Artificial Intelligence (AI) methologies establishing a more fluid ability to work with in a heterogeneous environment like never before, producing a strong technology.
Phen is educated in order to alert and uncover issues with it’s knowledge. Phen is capable of reducing breach discovery from the industry average of 220 days down to under 15 minutes. Phen utilizes application reasoning and has common sense. Through induction Phen can create facts while exploring the computing environment. Phen can the ability to consume new data from other data sources. Phen develops new concepts and relations with the data. Phen performs deductive logic and reasoning on the facts. By using the new knowledge Phen proactively alerts and notifies discoveries in a probabilistic way.
CCG’s software and packages have been developed over the last 24 years. The primary purpose of the software, primarily Cognoscenti, is that of “engagement” and “witnessing.” The software will help in defending systems from targeted attacks aimed at stealing insider and proprietary information. Our software will effectively identify common methods of attack across all devices in your enterprise or network. The software will detect anomalies produced by attacks not yet known or identified. We have developed and created these unique solutions to defend and help identify such activity in order to keep your business secure from cyber threats.
We have worked with large industry leading Internet Service Providers (ISPs), Fortune 500 companies, and no less than 5 Government Departments/Administrations/Bureaus. The CCG team has been integrated in teams directly responsible with securing large, high profile internet facing systems. We are vigilant in witnesssing security related issues and problems firsthand, actively playing a role in identifying and providing solutions to resolve the vulnerability and exposure of unwanted activity. We have been involved in security with TCP/IP (internet) systems since the dawn of the world wide web (back into the days of ARPANET and MILNET.) CCG has leveraged that information and experience to provide several flexible frameworks and software whose job it is to manage and automate solutions to reduce and limit a customer’s risk and vulnerability.
How they work together…
Cognoscenti and CanSecure can be paired to help provide an enriched and comprehensive picture of your enterprise. Cognoscenti shares information with CanSecure to provide complete enterprise security testing, penetration and vulnerabilities analyses and compliance to configuration standards.
NeTERS can augment information and data discovered with both Cognoscenti and CanSecure. Since they actively detect and discover what devices are doing in
a programmatic way, Cognoscenti and CanSecure can feed that data into NeTERS to provide full discovery of risks and vulnerabilities. NeTERS
can also reflexively feed data to Cognoscenti and CanSecure as it detects and discovers new devices on the network.
The SLA collates data from all the various software to increase awareness of the enterprise. It provides processing power to correlate and improve the knowledge of ongoing activities and the
ability to detect anomalies and changes that may indicate attacks or breaches. Information is power and this is where the knowledge is fully analyzed and processed.