www.ibm.com Open in urlscan Pro
2600:141b:5000:4a0::1e89  Public Scan

Submitted URL: https://nds.naids.ibm.com/t/11687/c/9738f4fd-c760-40a4-bc07-52f8e3732bc4/NB2HI4DTHIXS653XO4XGSYTNFZRW63JPOBZG6ZDVMN2HGL3SM...
Effective URL: https://www.ibm.com/products/reaqta
Submission: On June 06 via api from CA — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

QRadar QRadar My IBM Log in
IBM Security ReaQta IBM Security ReaQta
 * Overview





IBM SECURITY REAQTA

AI-powered, automated endpoint security


Download ESG report on endpoint security (619 KB)
EDR Buyer’s Guide

Schedule a consultation




 


TRANSFORMING HOW CLIENTS MANAGE RISK WITH ATTACK SURFACE MANAGEMENT

IBM announces plan to acquire Randori


Learn more


OVERVIEW


A UNIQUE APPROACH TO ENDPOINT SECURITY

Traditional endpoint security, including antivirus and signature-based
protection, may not be enough. And yet, as seen through the rise of extended
detection and response (XDR), endpoints are critical to broader visibility
across the enterprise, whether in cloud, on servers or elsewhere. With XDR here
to stay, endpoint security should evolve to keep pace.

ReaQta leverages exceptional levels of intelligent automation and AI to help
detect and remediate known and unknown threats in near real time. With deep
visibility across endpoints, it combines expected features, such as MITRE ATT&CK
mapping and attack visualizations, with dual-engine AI and automation to propel
endpoint security into a zero trust world.

Read More

Read customer reviews




BENEFITS


UNDETECTABLE BY DESIGN

NanoOS, a unique hypervisor-based approach, works outside the operating system,
providing deep visibility into processes and applications running on endpoints.


CONTINUAL LEARNING AND IMPROVEMENT

Automated, AI-powered threat detection and threat hunting includes telemetry
from indicators that can be customized for proprietary detection and granular
search.


NEAR REAL-TIME RESPONSE

Guided and autonomous remediation can simplify and speed response, freeing up
analysts’ time. The cyber assistant learns from analyst decisions, then retains
behaviors to reduce false positives.


TAILOR-MADE THREAT HUNTING

Custom detection strategies — beyond “out of the box” models — help address
compliance or company-specific requirements without the need to reboot the
endpoint.


FEATURES

1/3


LIGHTWEIGHT ENDPOINT AGENT

The agent, which uses less than 1% of CPU, is undetectable by design.


MULTIPLE DEPLOYMENT OPTIONS

Deploy in cloud, on premises or in air-gapped environments.


MULTI-TENANCY FOR MSSPS

Enable easy customer management and reporting on one console.


PRODUCT IMAGES

 * Behavioral tree
 * Behavioral tree storyline
 * Cyber Assistant alerts
 * Cyber Assistant recommends
 * Custom detection strategies


BEHAVIORAL TREE
VIEW BEHAVIORAL TREE


BEHAVIORAL TREE

A behavioral tree provides full alert and attack visibility.


BEHAVIORAL TREE STORYLINE
VIEW BEHAVIORAL TREE STORYLINE


BEHAVIORAL TREE STORYLINE

A user-friendly visual storyline is automatically created as an attack unfolds,
including mapping to MITRE ATT&CK, for full visibility.


CYBER ASSISTANT ALERTS
VIEW CYBER ASSISTANT ALERTS


CYBER ASSISTANT ALERTS

The Cyber Assistant, an AI-powered alert management system, can autonomously
handle alerts, reducing analysts’ workloads.


CYBER ASSISTANT RECOMMENDS
VIEW CYBER ASSISTANT RECOMMENDS


CYBER ASSISTANT RECOMMENDS

The Cyber Assistant learns from analyst decisions, then retains the intellectual
capital and learned behaviors to make recommendations and help reduce false
positives.


CUSTOM DETECTION STRATEGIES
VIEW CUSTOM DETECTION STRATEGIES


CUSTOM DETECTION STRATEGIES

Detection Strategy (DeStra) scripting allows users to build custom detection
strategies — beyond preconfigured models — to address compliance or
company-specific requirements without the need to reboot the endpoint.




CRITICAL INFRASTRUCTURE

Tracking a highly sophisticated supply chain attack against a water management
facility.



See case study (2.0 MB)




RESOURCES


EDR BUYER’S GUIDE



Learn which questions to ask and what to look for when evaluating key elements
of a modern EDR solution.

Get the guide


IBM SECURITY REAQTA MITRE ENGENUITY ATT&CK EVALUATION



Learn how ReaQta achieved 100% detection across the cyber-kill chain, without
configuration changes or delays.

Listen to the webcast on demand


SECURITY MEGATRENDS AND THEIR IMPACT ON ENDPOINT SECURITY



Read how global trends — remote work, zero trust, XDR — influence the way
organizations think about endpoint security.

Read the ESG report (612 KB)


IBM SECURITY REAQTA FOR MSSPS



Learn how MSSPs can effortlessly manage and secure more of their customers’
endpoints, all from an easy-to-use platform.

Read the solution brief (508 KB)


MITRE ATT&CK EVALUATION



MITRE’s evaluation validated ReaQta’s AI-powered, automated approach to
detecting sophisticated threats.

Read the results (269 KB)


MAJOR INTERNATIONAL AIRPORT



Learn how ReaQta went hunting for malware inside an air-gapped network.

Read the case study (1.7 MB)




RELATED PRODUCTS AND SERVICES


IBM SECURITY® QRADAR® XDR

Use this modular suite of threat detection and response tools to eliminate
advanced threats faster.

Explore the product


IBM SECURITY® QRADAR® XDR CONNECT

Connect your tools, automate your SOC and streamline workflows. Free up time for
what matters most.

Explore the product


MANAGED DETECTION AND RESPONSE (MDR) SERVICES

Faster threat defense starts with 24x7, AI-powered managed prevention, detection
and response.

Explore the services




HAVE A QUESTION? TALK TO A REAQTA EXPERT.



Book a meeting




PRODUCTS & SOLUTIONS

 * Top products & platforms
 * Industries
 * Artificial intelligence
 * Blockchain
 * Business operations
 * Cloud computing
 * Data & Analytics
 * Hybrid cloud
 * IT infrastructure
 * Security
 * Supply chain


LEARN ABOUT

 * What is Hybrid Cloud?
 * What is Artificial intelligence?
 * What is Cloud Computing?
 * What is Kubernetes?
 * What are Containers?
 * What is DevOps?
 * What is Machine Learning?


POPULAR LINKS

 * IBM Consulting
 * Communities
 * Developer education
 * Support - Download fixes, updates & drivers
 * IBM Research
 * Partner with us - PartnerWorld
 * Training - Courses
 * Upcoming events & webinars


ABOUT IBM

 * Annual report
 * Career opportunities
 * Corporate social responsibility
 * Diversity & inclusion
 * Industry analyst reports
 * Investor relations
 * News & announcements
 * Thought leadership
 * Security, privacy & trust
 * About IBM


SELECT A COUNTRY/REGION

United States - EnglishArgentina - SpanishAustralia - EnglishAustria -
GermanBelgium/Luxembourg - EnglishBrazil - PortugueseCanada - EnglishCanada -
FrenchChile - SpanishChina - Chinese (Simplified)Colombia - SpanishCzech
Republic - EnglishDenmark - EnglishEgypt - EnglishFinland - EnglishFrance -
FrenchGermany - GermanHong Kong S.A.R. of China - EnglishHungary - EnglishIndia
- EnglishIndonesia - EnglishIreland - EnglishIsrael - EnglishItaly -
ItalianJapan - JapaneseKorea, Republic of - KoreanMalaysia - EnglishMexico -
SpanishNetherlands - EnglishNew Zealand - EnglishNorway - EnglishPeru -
SpanishPhilippines - EnglishPoland - PolishPortugal - EnglishRomania -
EnglishSaudi Arabia - ArabicSaudi Arabia - EnglishSingapore - EnglishSouth
Africa - EnglishSpain - SpanishSweden - EnglishSwitzerland - FrenchSwitzerland -
GermanTaiwan - Chinese (Traditional)Thailand - EnglishTurkey - TurkishUnited
Arab Emirates - ArabicUnited Arab Emirates - EnglishUnited Kingdom -
EnglishVietnam - EnglishAfghanistan - EnglishAlgeria - FrenchAngola -
PortugueseAnguilla - EnglishAntigua and Barbuda - EnglishAruba - EnglishBahamas
- EnglishBahrain - EnglishBangladesh - EnglishBarbados -
EnglishBelgium/Luxembourg - DutchBelgium/Luxembourg - FrenchBermuda -
EnglishBolivia - SpanishBotswana - EnglishBrunei Darussalam - EnglishBulgaria -
BulgarianBulgaria - EnglishBurkina Faso - FrenchCambodia - EnglishCameroon -
EnglishCameroon - FrenchCayman Islands - EnglishChad - FrenchCongo -
FrenchCongo, The Democratic Republic of the - FrenchCosta Rica - SpanishCroatia
- CroatianCroatia - EnglishCuracao - EnglishCyprus - EnglishCzech Republic -
CzechDenmark - DanishDominica - EnglishEcuador - SpanishEstonia - EnglishEstonia
- EstonianEthiopia - EnglishFinland - FinnishGabon - FrenchGhana - EnglishGreece
- EnglishGreece - GreekGrenada - EnglishGuyana - EnglishHungary - HungarianIraq
- EnglishIsrael - HebrewIvory Coast - FrenchJamaica - EnglishJordan -
EnglishKazakhstan - EnglishKazakhstan - KazakhKenya - EnglishKuwait -
EnglishLatvia - EnglishLatvia - LatvianLebanon - EnglishLibya - EnglishLithuania
- EnglishLithuania - LithuanianMadagascar - FrenchMalawi - EnglishMauritius -
EnglishMauritius - FrenchMontserrat - EnglishMorocco - FrenchMozambique -
PortugueseNamibia - EnglishNepal - EnglishNetherlands - DutchNiger -
FrenchNigeria - EnglishNorway - NorwegianOman - EnglishPakistan -
EnglishParaguay - SpanishPortugal - PortugueseQatar - EnglishRomania -
RomanianRussian Federation - RussianSaint Kitts and Nevis - EnglishSaint Lucia -
EnglishSaint Vincent and the Grenadines - EnglishSenegal - FrenchSerbia -
EnglishSerbia - SerbianSeychelles - FrenchSierra Leone - EnglishSlovakia -
EnglishSlovakia - SlovakSlovenia - EnglishSlovenia - SlovenianSri Lanka -
EnglishSuriname - EnglishSweden - SwedishTanzania, United Republic of -
EnglishTrinidad and Tobago - EnglishTunisia - FrenchTurks and Caicos Islands -
EnglishUganda - EnglishUkraine - EnglishUkraine - UkrainianUruguay -
SpanishUzbekistan - EnglishUzbekistan - UzbekVenezuela - SpanishVietnam -
VietnameseVirgin Islands, British - EnglishYemen - EnglishZambia -
EnglishZimbabwe - EnglishUnited States - English

--------------------------------------------------------------------------------

 * Contact IBM
 * Privacy
 * Terms of use
 * Accessibility
 * Cookie Preferences




Let’s talk

Contact Us
CA—En


SELECT YOUR PREFERRED CONTACT CHANNEL:

Email sales



IBM web domains

ibm.com, ibm.dev, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net,
merge.com, micromedex.com, mobilebusinessinsights.com, promontory.com,
proveit.com, ptech.org, resource.com, s81c.com, securityintelligence.com,
skillsbuild.org, softlayer.com, storagecommunity.org, strongloop.com,
teacheradvisor.org, think-exchange.com, thoughtsoncloud.com, trusteer.com,
truven.com, truvenhealth.com, alphaevents.webcasts.com, betaevents.webcasts.com,
ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net,
ibmcloud.com, redhat.com, galasa.dev, blueworkslive.com, swiss-quantum.ch,
altoromutual.com, blueworkslive.cn, blueworkslive.com, cloudant.com, ibm.ie,
ibm.fr, ibm.com.br, ibm.co, ibm.ca, silverpop.com,
community.watsonanalytics.com, eclinicalos.com, datapower.com,
ibmmarketingcloud.com, thinkblogdach.com, truqua.com, my-invenio.com,
skills.yourlearning.ibm.com, bluewolf.com, asperasoft.com, instana.com,
taos.com, envizi.com
About cookies on this site Our websites require some cookies to function
properly (required). In addition, other cookies may be used with your consent to
analyze site usage, improve the user experience and for advertising. For more
information, please review your Cookie preferences  options and IBM’s privacy
statement. To provide a smooth navigation, your cookie preferences will be
shared across the IBM web domains listed here.

Accept all Required only