CSI: ACE Insight

A CyberSecurity Intelligence (CSI)


E.g.: 10.1.16.32,
http://www.domain.com,
http://www.domain.com/sub/sub/sub.html,
http://www.pathtofile.com/file.exe
Url contains invalid format or characters 5 reports remaining CSI ACE Insight is a tool for assessing the current state and risk level of a web link or IP address.
CSI ACE Insight performs real-time content analysis, and then displays a report of its findings.

Files are analyzed in the Forcepoint Advanced Malware Detection™ tool, a sandbox that identifies threats and, if applicable, provides forensic details on a file's infection and post-infection behavior. File submission methods and sandboxing results vary according to user access level:

  • All Levels: The Advanced Malware Detection tool is activated whenever a link submitted to CSI ACE Insight initiates a file download.
  • Level 1 & 2: Only web-based files can be submitted to the Advanced Malware Detection tool, under the "Enter a URL/IP Address" tab. A CSI ACE Insight report is generated after analysis, indicating the severity level of any threat detected.
  • Level 3: Local files and web-based files can be submitted to the Advanced Malware Detection tool, under the "Upload a File" tab or "Enter a URL/IP Address" tab, respectively. A complete ACE Insight Report is generated after analysis, indicating the severity level of any threat detected, as well as describing any activities found in processes, the registry, and other areas of the computer.

Welcome Guest

Login

Your current level of access:

2019 Forcepoint Cybersecurity Predictions Report

The intersection of people interacting with data and technology will drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

Latest from Security Labs Blog

Webinar: CISO Strategy for the Cloud

September 28, 2020

I recently participated in a webinar discussion about how CISOs and security leads are securing and navigating the cloud. It’s a pressing topic for many in a time when cloud adoption is accelerating across many, if not most industries. In fact, according to IDG’s 2020 Cloud Computing Survey

Government Organizations Must Rein in Privileged Users

September 24, 2020

Just last week, the Department of Veterans Affairs announced a data breach had exposed the personal information of up to 46,000 veterans. While data breaches have many causes, privileged credential abuse is a

Forcepoint Game Plan Video Series - Cloud Security with Nico Popp

September 23, 2020

Back in May, Chief Product Officer Nico Popp used a whiteboard to make the case on how to move left of breach. Recently, we asked him to map out Forcepoint’s cloud security strategy in front of a lightboard. The exercise resulted in Forcepoint’s new