www.ibm.com
Open in
urlscan Pro
2600:141b:5000:4a0::1e89
Public Scan
Submitted URL: https://nds.naids.ibm.com/t/11687/c/9738f4fd-c760-40a4-bc07-52f8e3732bc4/NB2HI4DTHIXS653XO4XGSYTNFZRW63JPOBZG6ZDVMN2HGL3SM...
Effective URL: https://www.ibm.com/products/reaqta
Submission: On June 06 via api from CA — Scanned from CA
Effective URL: https://www.ibm.com/products/reaqta
Submission: On June 06 via api from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
QRadar QRadar My IBM Log in IBM Security ReaQta IBM Security ReaQta * Overview IBM SECURITY REAQTA AI-powered, automated endpoint security Download ESG report on endpoint security (619 KB) EDR Buyer’s Guide Schedule a consultation TRANSFORMING HOW CLIENTS MANAGE RISK WITH ATTACK SURFACE MANAGEMENT IBM announces plan to acquire Randori Learn more OVERVIEW A UNIQUE APPROACH TO ENDPOINT SECURITY Traditional endpoint security, including antivirus and signature-based protection, may not be enough. And yet, as seen through the rise of extended detection and response (XDR), endpoints are critical to broader visibility across the enterprise, whether in cloud, on servers or elsewhere. With XDR here to stay, endpoint security should evolve to keep pace. ReaQta leverages exceptional levels of intelligent automation and AI to help detect and remediate known and unknown threats in near real time. With deep visibility across endpoints, it combines expected features, such as MITRE ATT&CK mapping and attack visualizations, with dual-engine AI and automation to propel endpoint security into a zero trust world. Read More Read customer reviews BENEFITS UNDETECTABLE BY DESIGN NanoOS, a unique hypervisor-based approach, works outside the operating system, providing deep visibility into processes and applications running on endpoints. CONTINUAL LEARNING AND IMPROVEMENT Automated, AI-powered threat detection and threat hunting includes telemetry from indicators that can be customized for proprietary detection and granular search. NEAR REAL-TIME RESPONSE Guided and autonomous remediation can simplify and speed response, freeing up analysts’ time. The cyber assistant learns from analyst decisions, then retains behaviors to reduce false positives. TAILOR-MADE THREAT HUNTING Custom detection strategies — beyond “out of the box” models — help address compliance or company-specific requirements without the need to reboot the endpoint. FEATURES 1/3 LIGHTWEIGHT ENDPOINT AGENT The agent, which uses less than 1% of CPU, is undetectable by design. MULTIPLE DEPLOYMENT OPTIONS Deploy in cloud, on premises or in air-gapped environments. MULTI-TENANCY FOR MSSPS Enable easy customer management and reporting on one console. PRODUCT IMAGES * Behavioral tree * Behavioral tree storyline * Cyber Assistant alerts * Cyber Assistant recommends * Custom detection strategies BEHAVIORAL TREE VIEW BEHAVIORAL TREE BEHAVIORAL TREE A behavioral tree provides full alert and attack visibility. BEHAVIORAL TREE STORYLINE VIEW BEHAVIORAL TREE STORYLINE BEHAVIORAL TREE STORYLINE A user-friendly visual storyline is automatically created as an attack unfolds, including mapping to MITRE ATT&CK, for full visibility. CYBER ASSISTANT ALERTS VIEW CYBER ASSISTANT ALERTS CYBER ASSISTANT ALERTS The Cyber Assistant, an AI-powered alert management system, can autonomously handle alerts, reducing analysts’ workloads. CYBER ASSISTANT RECOMMENDS VIEW CYBER ASSISTANT RECOMMENDS CYBER ASSISTANT RECOMMENDS The Cyber Assistant learns from analyst decisions, then retains the intellectual capital and learned behaviors to make recommendations and help reduce false positives. CUSTOM DETECTION STRATEGIES VIEW CUSTOM DETECTION STRATEGIES CUSTOM DETECTION STRATEGIES Detection Strategy (DeStra) scripting allows users to build custom detection strategies — beyond preconfigured models — to address compliance or company-specific requirements without the need to reboot the endpoint. CRITICAL INFRASTRUCTURE Tracking a highly sophisticated supply chain attack against a water management facility. See case study (2.0 MB) RESOURCES EDR BUYER’S GUIDE Learn which questions to ask and what to look for when evaluating key elements of a modern EDR solution. Get the guide IBM SECURITY REAQTA MITRE ENGENUITY ATT&CK EVALUATION Learn how ReaQta achieved 100% detection across the cyber-kill chain, without configuration changes or delays. Listen to the webcast on demand SECURITY MEGATRENDS AND THEIR IMPACT ON ENDPOINT SECURITY Read how global trends — remote work, zero trust, XDR — influence the way organizations think about endpoint security. Read the ESG report (612 KB) IBM SECURITY REAQTA FOR MSSPS Learn how MSSPs can effortlessly manage and secure more of their customers’ endpoints, all from an easy-to-use platform. Read the solution brief (508 KB) MITRE ATT&CK EVALUATION MITRE’s evaluation validated ReaQta’s AI-powered, automated approach to detecting sophisticated threats. Read the results (269 KB) MAJOR INTERNATIONAL AIRPORT Learn how ReaQta went hunting for malware inside an air-gapped network. Read the case study (1.7 MB) RELATED PRODUCTS AND SERVICES IBM SECURITY® QRADAR® XDR Use this modular suite of threat detection and response tools to eliminate advanced threats faster. Explore the product IBM SECURITY® QRADAR® XDR CONNECT Connect your tools, automate your SOC and streamline workflows. Free up time for what matters most. Explore the product MANAGED DETECTION AND RESPONSE (MDR) SERVICES Faster threat defense starts with 24x7, AI-powered managed prevention, detection and response. Explore the services HAVE A QUESTION? TALK TO A REAQTA EXPERT. Book a meeting PRODUCTS & SOLUTIONS * Top products & platforms * Industries * Artificial intelligence * Blockchain * Business operations * Cloud computing * Data & Analytics * Hybrid cloud * IT infrastructure * Security * Supply chain LEARN ABOUT * What is Hybrid Cloud? * What is Artificial intelligence? * What is Cloud Computing? * What is Kubernetes? * What are Containers? * What is DevOps? * What is Machine Learning? POPULAR LINKS * IBM Consulting * Communities * Developer education * Support - Download fixes, updates & drivers * IBM Research * Partner with us - PartnerWorld * Training - Courses * Upcoming events & webinars ABOUT IBM * Annual report * Career opportunities * Corporate social responsibility * Diversity & inclusion * Industry analyst reports * Investor relations * News & announcements * Thought leadership * Security, privacy & trust * About IBM SELECT A COUNTRY/REGION United States - EnglishArgentina - SpanishAustralia - EnglishAustria - GermanBelgium/Luxembourg - EnglishBrazil - PortugueseCanada - EnglishCanada - FrenchChile - SpanishChina - Chinese (Simplified)Colombia - SpanishCzech Republic - EnglishDenmark - EnglishEgypt - EnglishFinland - EnglishFrance - FrenchGermany - GermanHong Kong S.A.R. of China - EnglishHungary - EnglishIndia - EnglishIndonesia - EnglishIreland - EnglishIsrael - EnglishItaly - ItalianJapan - JapaneseKorea, Republic of - KoreanMalaysia - EnglishMexico - SpanishNetherlands - EnglishNew Zealand - EnglishNorway - EnglishPeru - SpanishPhilippines - EnglishPoland - PolishPortugal - EnglishRomania - EnglishSaudi Arabia - ArabicSaudi Arabia - EnglishSingapore - EnglishSouth Africa - EnglishSpain - SpanishSweden - EnglishSwitzerland - FrenchSwitzerland - GermanTaiwan - Chinese (Traditional)Thailand - EnglishTurkey - TurkishUnited Arab Emirates - ArabicUnited Arab Emirates - EnglishUnited Kingdom - EnglishVietnam - EnglishAfghanistan - EnglishAlgeria - FrenchAngola - PortugueseAnguilla - EnglishAntigua and Barbuda - EnglishAruba - EnglishBahamas - EnglishBahrain - EnglishBangladesh - EnglishBarbados - EnglishBelgium/Luxembourg - DutchBelgium/Luxembourg - FrenchBermuda - EnglishBolivia - SpanishBotswana - EnglishBrunei Darussalam - EnglishBulgaria - BulgarianBulgaria - EnglishBurkina Faso - FrenchCambodia - EnglishCameroon - EnglishCameroon - FrenchCayman Islands - EnglishChad - FrenchCongo - FrenchCongo, The Democratic Republic of the - FrenchCosta Rica - SpanishCroatia - CroatianCroatia - EnglishCuracao - EnglishCyprus - EnglishCzech Republic - CzechDenmark - DanishDominica - EnglishEcuador - SpanishEstonia - EnglishEstonia - EstonianEthiopia - EnglishFinland - FinnishGabon - FrenchGhana - EnglishGreece - EnglishGreece - GreekGrenada - EnglishGuyana - EnglishHungary - HungarianIraq - EnglishIsrael - HebrewIvory Coast - FrenchJamaica - EnglishJordan - EnglishKazakhstan - EnglishKazakhstan - KazakhKenya - EnglishKuwait - EnglishLatvia - EnglishLatvia - LatvianLebanon - EnglishLibya - EnglishLithuania - EnglishLithuania - LithuanianMadagascar - FrenchMalawi - EnglishMauritius - EnglishMauritius - FrenchMontserrat - EnglishMorocco - FrenchMozambique - PortugueseNamibia - EnglishNepal - EnglishNetherlands - DutchNiger - FrenchNigeria - EnglishNorway - NorwegianOman - EnglishPakistan - EnglishParaguay - SpanishPortugal - PortugueseQatar - EnglishRomania - RomanianRussian Federation - RussianSaint Kitts and Nevis - EnglishSaint Lucia - EnglishSaint Vincent and the Grenadines - EnglishSenegal - FrenchSerbia - EnglishSerbia - SerbianSeychelles - FrenchSierra Leone - EnglishSlovakia - EnglishSlovakia - SlovakSlovenia - EnglishSlovenia - SlovenianSri Lanka - EnglishSuriname - EnglishSweden - SwedishTanzania, United Republic of - EnglishTrinidad and Tobago - EnglishTunisia - FrenchTurks and Caicos Islands - EnglishUganda - EnglishUkraine - EnglishUkraine - UkrainianUruguay - SpanishUzbekistan - EnglishUzbekistan - UzbekVenezuela - SpanishVietnam - VietnameseVirgin Islands, British - EnglishYemen - EnglishZambia - EnglishZimbabwe - EnglishUnited States - English -------------------------------------------------------------------------------- * Contact IBM * Privacy * Terms of use * Accessibility * Cookie Preferences Let’s talk Contact Us CA—En SELECT YOUR PREFERRED CONTACT CHANNEL: Email sales IBM web domains ibm.com, ibm.dev, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net, merge.com, micromedex.com, mobilebusinessinsights.com, promontory.com, proveit.com, ptech.org, resource.com, s81c.com, securityintelligence.com, skillsbuild.org, softlayer.com, storagecommunity.org, strongloop.com, teacheradvisor.org, think-exchange.com, thoughtsoncloud.com, trusteer.com, truven.com, truvenhealth.com, alphaevents.webcasts.com, betaevents.webcasts.com, ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net, ibmcloud.com, redhat.com, galasa.dev, blueworkslive.com, swiss-quantum.ch, altoromutual.com, blueworkslive.cn, blueworkslive.com, cloudant.com, ibm.ie, ibm.fr, ibm.com.br, ibm.co, ibm.ca, silverpop.com, community.watsonanalytics.com, eclinicalos.com, datapower.com, ibmmarketingcloud.com, thinkblogdach.com, truqua.com, my-invenio.com, skills.yourlearning.ibm.com, bluewolf.com, asperasoft.com, instana.com, taos.com, envizi.com About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your Cookie preferences options and IBM’s privacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here. Accept all Required only