CSI: ACE Insight

A CyberSecurity Intelligence (CSI)


E.g.: 10.1.16.32,
http://www.domain.com,
http://www.domain.com/sub/sub/sub.html,
http://www.pathtofile.com/file.exe
Url contains invalid format or characters 5 reports remaining CSI ACE Insight is a tool for assessing the current state and risk level of a web link or IP address.
CSI ACE Insight performs real-time content analysis, and then displays a report of its findings.

Files are analyzed in the Forcepoint Advanced Malware Detection™ tool, a sandbox that identifies threats and, if applicable, provides forensic details on a file's infection and post-infection behavior. File submission methods and sandboxing results vary according to user access level:

  • All Levels: The Advanced Malware Detection tool is activated whenever a link submitted to CSI ACE Insight initiates a file download.
  • Level 1 & 2: Only web-based files can be submitted to the Advanced Malware Detection tool, under the "Enter a URL/IP Address" tab. A CSI ACE Insight report is generated after analysis, indicating the severity level of any threat detected.
  • Level 3: Local files and web-based files can be submitted to the Advanced Malware Detection tool, under the "Upload a File" tab or "Enter a URL/IP Address" tab, respectively. A complete ACE Insight Report is generated after analysis, indicating the severity level of any threat detected, as well as describing any activities found in processes, the registry, and other areas of the computer.

Welcome Guest

Login

Your current level of access:

Latest from X-Labs Blog

    

Zero Trust CDR Early Access Program: Stop Email Malware Now

December 1, 2022

Today, Forcepoint embarks on offering organizations a new way to protect one of the largest attack surfaces: Email.

 
    

Protecting Critical Infrastructure: A To The Point Cybersecurity Podcast Recap

November 30, 2022

At the start of the month, the Biden administration met with over 30 allied countries to discuss the rise of ransomware attacks on critical infrastructure. It’s an urgent conversation—and one particularly well-suited for November, which is both election season and Infrastructure Security Month .

 
    

Simplify web security posture with Remote Browser Isolation

November 29, 2022

This year’s Verizon Data Breach Investigations Report highlighted web applications and email as the top two threat vectors used to infiltrate organizations. On its own, this finding comes as no surprise given the ever-increasing number of web-based attacks, what is startling is the way most organizations continue to manage web security access.