24/7 U.S. SOC
U.S. based 24x7 security operations including threat hunting, forensic investigations, and remediation recommendations.
Network Detection & Response
Extend packet layer detection and response to any device connected to the network. Ideal for detecting advanced threats that bypass EDR or the Firewall and for protecting devices that cannot support an agent.
SIEM + SOAR
KMT's Fully-Managed SIEM + SOAR shortens the response time to the most critical cybersecurity alerts putting your organization at risk.
Cloud Monitoring
Comprehensive monitoring of all leading Cloud environments including Azure, Google Cloud, AWS, and Office 365.
Vulnerability Detection
Agentless vulnerability scanning for all network devices and agent-based vulnerability detection for all endpoints and servers wherever they reside - on-premises, at home, or in the cloud.
Cybersecurity for Remote Teams
KMT XDR agent uploads security incident and event logs for remote users to the on-prem Analysis Edge Node via a secure cloud connection broker.
EDR Integrations
KMT XDR is integrated with leading EDR solutions such as Sentinel One, Sophos, Windows Defender, Malware Bytes, Symantec, and Crowd Strike
Security Operation Center (SOC)
KMT's SOC is a virtual operation that is hosted in Amazon Web Services (AWS). Access to systems hosted in our virtual SOC is tightly controlled and logged through both 2FA VPN access, ED25519 key exchanges and hardware OTP keys. While KMT does maintain secure areas at our corporate headquarters for SOC operations, our platform is designed for zero-trust, virtual SOC operations from anywhere in the world, allowing our analysts to work remotely at any time for any reason.
Cyber Threat Edge Nodes
Analytics Nodes
The analytics nodes are the brains of the KMT XDR system. They securely collect and store data from both the PCAP nodes and the XDR Agents, both for real time and historical analysis and for archival purposes. Analytics nodes can be clustered for both added compute capacity and added redundancy. Customers can receive credentials for read-only access of the system dashboards and reporting features.
Analytics nodes can be run in the cloud, on customer COTS hardware or can be purchased pre-configured from KMT and/or its partners. They run a hardened version of the Linux Operating System (Ubuntu 20.04 LTS Server). No customer or third-party access is allowed to the device via SSH. Only authorized KMT personnel with proper credentials to access our SOC are allowed to access the device via our zero-trust agent.
Each Analytics Node is uniquely keyed at provisioning with KMT's PKI infrastructure that allows that node to securely communicate with our SOC via non-publicly available APIs. Keys are both pre-shared keys (PSK) and signed 4096 RSA public/private keys.
In addition, each device is given both a unique device id, and API key at provisioning to further secure access to our API infrastructure.
Lastly, each node shares a unique ED25519 SSH key exchange with our SOC infrastructure, so all access to the node data from our SOC is double-encrypted from our SOC.
PCAP Nodes
KMT's PCAP Nodes can be run on customers' COTS hardware or purchased pre-configured from KMT and/or its partners. They run a hardened version of the Linux operating system (Ubuntu 20.04 LTS Server). No customer or third party access is allowed to the device via SSH. Only authorized KMT personnel with proper credentials to access our SOC are allowed to access the device via our agent.
Each node is uniquely keyed at provisioning with KMT's PKI infrastructure that allows that node to securely communicate with our SOC via non-publicly available APIs. Keys are both pre-shared keys (PSK) and signed 4096 RSA public/private keys. In addition, each device is given both a unique device ID, and API key at provisioning to further secure access to our API infrastructure.
Lastly, each node shares a unique ED25519 SSH key exchange with our SOC infrastructure, so all access to the node data from our SOC is double-encrypted from our SOC.
PCAP Nodes ingest and decode network traffic and feed that decoded traffic securely to the Analytics node. Additional services such as intrusion detection and prevention, deception, vulnerability scanning and threat intelligence are provided by the PCAP nodes.
Full Nodes
All in one combined Analytics and PCAP Node.
SIEM Agents
KMT XDR has the ability to ingest data from agents installed on endpoints throughout the organization, regardless of where those endpoints are physically located. Agents are available for Microsoft Windows, Linux, MacOS. Solaris, and AIX. The low memory and low CPU footprint agents allows the Analytics node to collect and analyze log and security event data, file and registry changes, system inventory, network configurations, vulnerability data, Sysmon, and other security related telemetry for analysis by the SOC.
Cloud
KMT XDR can monitor cloud infrastructures in several ways. For Amazon EC2, Azure Virtual Machines, Google Cloud Platform Virtual Machines and Digital Ocean Droplets, the XDR agent can be installed directly on the virtual instances. In addition, through API integration, KMT XDR can monitor the platform environment for Amazon AWS, Google Cloud Platform, Microsoft Azure and Azure AD.
Cloud Connection Broker
Securely uploads SIEM logs from remote / work from home users to the KMT Analytics Node.
Dashboards and Reporting
The XDR platform includes monthly automated reporting and provides for read only access to dashboards and allows for dashboard reports to be emailed on a frequency chosen by the customer. IT staff are notified of events based on their preferred method and related tickets are created and tracked via the KMT Help Desk. IT staff can, at their option, securely log in via VPN and view the on-premise back-end dashboards. Access to the new Incident Response Portal is also available in order to view automated push alerts.
Management Console
KMT also offers a web based, multi-tenant management console that displays aggregate alert and threat data over a defined time period. The KMT Management Console provides a comprehensive view of your entire secured environment and shows real-time insights into how KMT is identifying and blocking cyber adversaries attempting to gain access to your IT infrastructure, including monthly reports and real-time access to: