PhalanxServicesContact Us
Level Effect’s Endpoint Detection and Response (EDR) capability is the first and only endpoint solution that merges endpoint forensics with deep network traffic visibility.
Network Visibility is Key to Advanced Threat Detection and Response
Advanced cyber-attacks are designed to evade traditional prevention and detection techniques. While attackers try to disguise their activities, their packets ultimately cross the network. Network traffic analysis is a key component of threat detection, hunting, and response by providing deep visibility into the techniques attackers use to infiltrate a network.
Merge Data Silos with Unified Logs and Complete Visibility
Phalanx can see what is happening internally and externally to the protected endpoint to provide unparalleled visibility and detection of advanced threats that may be operating within the network. This blending of data provides context and illuminates anomalous activity.
Automate at the Source
The endpoint is the site of the crime, the source of the data we are hunting for. This is where the adversary exploits, pivots, and maintains access. Here is where Phalanx will identify and detect these threats with the ability to see both endpoint and network activity.
Managed Threat Hunting
Threat hunting is the process of searching through a network to find signs of compromise or intrusion that made it past preventative defenses. Using Phalanx, Level Effect will work alongside your IT & Security teams discovery, isolate and contain identified network threats.
No other capability provides the same level of network and endpoint visibility in a single solution.
Phalanx Features
Network logging from the endpoint perspective, distilled down to datapoints important to finding threats.
Utilizing the popular MITRE ATT&CK framework, Phalanx correlates system and network events to known adversarial behaviors.
Phalanx surveys endpoint systems for installed applications and patches, looking for vulnerabilities and missing updates.
Remotely task and remediate systems using WMIC, Powershell, and native Windows Commands.
Use Phalanx’s unique data and platform to conduct real-time forensics and hunt for threats in your network.
Request a Quote
Phalanx Frequently Asked Questions (FAQ)
What is the system resource impact by installing Phalanx?
Phalanx consumes 0-5% CPU and 10-40 MB of RAM depending on OS and network activity.
Does Phalanx open any new ports?
Phalanx does not open any new ports on the system. Phalanx uses port 443 over TCP for all communication
Where does collected data go?
Phalanx is a cloud-native solution. Collected data is transmitted to Phalanx's cloud platform on Amazon’s AWS. Currently, Phalanx does not have an available option for an on-premise data solution.
How does Level Effect protect collected data?
Collected data is encrypted on the workstation at rest, securely transmitted via TLS 1.3, and encrypted at rest once in the Phalanx analytic cloud.
How is Phalanx installed and configured?
Phalanx can be installed manually via local installer or deployed silently across the network via SCCM or similar deployment solutions. Phalanx does not require system reboots or any configuration to begin working.
© 2020 by
Follow Us