CSI: ACE Insight

A CyberSecurity Intelligence (CSI)


E.g.: 10.1.16.32,
http://www.domain.com,
http://www.domain.com/sub/sub/sub.html,
http://www.pathtofile.com/file.exe
Url contains invalid format or characters 5 reports remaining CSI ACE Insight is a tool for assessing the current state and risk level of a web link or IP address.
CSI ACE Insight performs real-time content analysis, and then displays a report of its findings.

Files are analyzed in the Forcepoint Advanced Malware Detection™ tool, a sandbox that identifies threats and, if applicable, provides forensic details on a file's infection and post-infection behavior. File submission methods and sandboxing results vary according to user access level:

  • All Levels: The Advanced Malware Detection tool is activated whenever a link submitted to CSI ACE Insight initiates a file download.
  • Level 1 & 2: Only web-based files can be submitted to the Advanced Malware Detection tool, under the "Enter a URL/IP Address" tab. A CSI ACE Insight report is generated after analysis, indicating the severity level of any threat detected.
  • Level 3: Local files and web-based files can be submitted to the Advanced Malware Detection tool, under the "Upload a File" tab or "Enter a URL/IP Address" tab, respectively. A complete ACE Insight Report is generated after analysis, indicating the severity level of any threat detected, as well as describing any activities found in processes, the registry, and other areas of the computer.

Welcome Guest

Login

Your current level of access:

2019 Forcepoint Cybersecurity Predictions Report

The intersection of people interacting with data and technology will drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

Latest from Security Labs Blog

A night with women leaders: be encouraged

September 20, 2019

Senior Software Development Manager Jennifer Parker shares her experiences at the recent Women Leaders in Technology event in Austin, Texas where she was a panelist in a discussion on women in technology. They covered the gamut from investment in STEM education, to workplace culture, to mentorship, and discussed ways to help overcome obstacles that women face in technology careers. Parker also

That's Classified: Why a Deep Understanding of Military Data Protection Delivers DLP for Enterprises Today

September 16, 2019

By Guest Contributor: Martin Sugden, CEO, Boldon James When the captain of a Navy ship receives a “Flash command,” he or she has three minutes to deliver a response: “Received, Understood, Actioned.” The commander has to be sure that the correct captain has received the message,

4 things to consider before purchasing a cross domain transfer solution

September 11, 2019

There are number of factors to consider when procuring any IT product- functionality, flexibility, cost, compliance, the list goes on. And the stakes are even higher when an agency is procuring a secure information sharing Cross Domain Solution as it needs to efficiently and securely support the most critical of missions. In this blog, we discuss some of the key decisions agencies need to