Attackers Today Think in Graphs, Not Lists

CPG stylized

Cyber defense strategies historically have focused on maintaining accurate lists of devices with their software versions and vulnerabilities. Besides being difficult to scale, this approach doesn't consider that attacks are increasingly focused on lateral movement that relies on mappings of the connections between devices.

To combat this, ACDP employs a graph-based defense strategy with its interactive Cyber-Physical Graph (CPG), which continuously ingests and correlates security data from internal and external sources to map and track relationships and data flows between entities and processes over time to support the complex use cases below.

Orange Globe Background Image

Example Use Cases