Luminar was deployed within a few days, with no interference
to operations. Following the CNI’s team onboarding and
training, the system became operational. Luminar has the
capacity to continuously monitor the CNI’s ~2,000 IT and
OT assets and to scale with the company.
By monitoring and analyzing clear, Deep & Dark Web sites,
as well as closed hacking forums, social networks, instant
messaging platforms and technical intelligence sources,
Luminar uncovers malicious activities at their earliest stages.
Luminar began gathering and ingesting relevant data from
threat intelligence sources, based on the CNI’s critical assets,
industry, region, and predefined threat hunting requirements.
The automated monitoring enabled the identification of
leaked records and mentions in the Deep and Dark Web in
real-time. The monitoring plan is dynamic and the assets
can be changed and updated in real-time and still ensure
the monitoring is accurate. In addition, reconnaissance
activities are performed to reveal exposures of the high-risk
personnel and recommend how to minimize the personal
attack surface.
Luminar is also used to monitor new domain registrations
that impersonate the organization in order to provide
early warnings and suggest take-down procedures, and to
monitor social media networks to alert in real-time when
customers mention such potentially fraud-related activity.
Since its implementation, Luminar has delivered threat intelligence findings regarding all the issues that drove the
organization to deploy a CTI solution to begin with, enabling the organization to proactively mitigate threats in the making.
Among the threats identified by Luminar were:
PROACTIVE DISCOVERY AND MITIGATION OF THREATS
CONTINUOUS COMPREHENSIVE MONITORING AT SCALE
About Cognyte Software Ltd.
Cognyte is the global leader in investigative analytics software that empowers governments and enterprises
with Actionable Intelligence for a Safer World
TM
.
Use of these products or certain features may be subject to applicable legal regulation. The user should familiarize itself with any applicable restrictions before use. These products are
intended only for lawful uses by legally authorized users. Not all features may be available in all jurisdictions and not all functionalities may be available in all configurations. Unauthorized use,
duplication, or modification of this document in whole or in part without the prior written consent of Cognyte Software Ltd. is strictly prohibited. By providing this document, Cognyte Software
Ltd. is not making any representations regarding the correctness or completeness of its contents and reserves the right to alter this document at any time without notice. Features listed in
this document are subject to change. Contact your Cognyte representative for current product features and specifications. All marks referenced herein with the ® or TM symbol are registered
trademarks or trademarks of Cognyte Software Ltd. or its subsidiaries. All other marks are trademarks of their respective owners. © 2021 Cognyte Software Ltd. All rights reserved worldwide.
Suspicious domains and
potential phishing attempts
Ransomware attacks
that have hit suppliers
Leaked records
Hacktivists attacks against the nation
resulted in attacks against the CNI
Fraud activities on energy
consumption meters
Customers defaming the
company over social media
Exposed and vulnerable servers
Employees that suffered a bot
attack and had their credentials
traded on the Dark Web