Phen.AI©️ is CCG’s proprietary cognitive learning Artificial Intelligent, patent-pending has been designed with methods to independently analyze systems, hunt for insider threats, and responsible for detecting any network problems, providing threat hunting, behavioral analytic detections and big data analytic. Including Pen-testing, complete visibility of your network and score these threats in order to help establish which systems are critical and recommend what additional protections are required. Phen.AI©️ uses the cognitive knowledge collected about a target including the frequency of changes and vulnerability history.
Phen.AI©️ employs a robust API to test applications and systems against the very latest threats known to the IT industry. Phen.AI©️ employs a cognitive learning and investigates endpoints and detailed network traffic, uses behavioral intelligence, state of the art knowledge base of vulnerabilities and MITRE ATT&CK to detect attacks and identify threat relationships across security events, system logs, Netflow, and deep packet inspections. CheckMate©️ provides real-time network and endpoint monitoring, signature alerting, profiling, and anomalous activity detection. CCG provides 100% coverage of your network 100% of the time and verifies all connects to networked systems through both passive and active pentesting preventing hidden and dark spots for the bad actors to gain a beachhead and hide.
Phen.AI©️ analyzes system types, internet proximity, and service usage to map the attack surface and identify vulnerabilities. By constantly acquiring comprehensive information, it provides real-time monitoring and defenses tailored to each target across the entire enterprise architecture. A key advantage is Phen.AI’s ability to proactively defend against adversaries attempting to access the network.
Phen.AI is designed to optimize cyber-defense based on the historical context and knowledge of your entire network. Engineered to simultaneously focus on the full network and granular subsets down to individual devices, Phen.AI rapidly ingests, analyzes, and captures massive amounts of PCAP data in real-time, exceeding human capabilities. It continuously monitors for:
- Unusual Activity: Detection of anomalous network/endpoint behavior and data access.
- Threat Identification: Phen.AI identifies threats and APTs by correlating data from system/application logs, DNS, DHCP, netflow, DPI, firewalls, and honeypots.
- Data Exfiltration Defense: Detection of new or abnormal protocol usage for collecting, encrypting, and exfiltrating data, including efforts to blend into normal traffic





