HYAS: Understanding Adversary Infrastructure

An Intellyx Brain Candy Brief

HYAS Infosec leverages extensive information about bad actors’ infrastructure to determine whether an enterprise resource should be interacting with a particular external endpoint.

Typical malware attacks require a command-and-control link, where the malware ‘phones home’ for instructions. Later in the attack, the malware usually exfiltrates data to an adversarial endpoint.

HYAS is able to detect, identify, and block such actions because of its understanding of adversarial endpoints.

HYAS then provides protective DNS for both the corporate and production environments to help organizations connect to safe endpoints while frustrating bad actors.

Copyright © Intellyx LLC. Intellyx is an industry analysis and advisory firm focused on enterprise digital transformation. Covering every angle of enterprise IT from mainframes to artificial intelligence, our broad focus across technologies allows business executives and IT professionals to connect the dots among disruptive trends. None of the organizations mentioned in this article is an Intellyx customer. No AI was used to produce this article. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS: