Overview
TitaniumScale helps enterprises form a comprehensive assessment of millions of files from web traffic, email, file transfers, endpoints or storage. The solution uses unique ReversingLabs File Decomposition Technology to extract detailed metadata, add global reputation context and classify threats. TitaniumScale automatically acquires files by integrating with solutions installed in the enterprise security infrastructure, including: email gateways, intrusion detection systems, firewalls and other devices. The results feed into industry leading SIEM, orchestration and analytics platforms to provide visibility, provide data to analytics tools, support advance hunting strategies and enable advanced policy enforcement.
Massively Scalable Architecture
TitaniumScale uses a flexible cluster architecture that scales incrementally to support distributed or centralized file processing across physical and cloud environments. The cluster incrementally scales file processing capacity from 100K to 100M files per day by adding Worker Nodes to the cluster. TitaniumScale consists of:
- Worker Nodes - A cluster of physical or virtual servers that perform the actual file assessment and support N+1 redundancy
- Load Balancer Hubs - A server (and optional redundant server) that directs files to Worker Nodes for processing
- Control Manager - A server that manages configuration (i.e. YARA rules, whitelists) and monitors status across the TitaniumScale cluster
Speed
- Files cataloged in milliseconds to support real-time, high-volume processing
Coverage
- Over 400 packed file types processed and 4800 file formats identified from diverse platforms, applications and malware families
Depth
-
Recursive unpacking and extraction of 3000 indicators per file
Reputation
-
Files checked against the industry’s most comprehensive database of goodware and malware - TitaniumCloud
Classification
-
Files classified by advanced rules engine that supports customer supplied YARA rules
Alerts
-
Real-time alerts to SIEM, SOAR or analytics platforms when malware is identified or a customer-defined YARA rule is triggered.