How it Works

Home/How it Works

Containment

containment

Invincea creates a secure virtual container, local to the desktop to wall off and seamlessly run the most highly targeted applications - web browsers, PDF reader, Office suite. 

Detection

Detection

A proprietary, behavioral based malware detection engine monitors the secure virtual container to spot any malicious behavior the moment it occurs. No signatures are required and our techniques have been proven to spot even zero-days in the wild.

Breach Prevention

Detection

The moment malicious activity is detected, Invincea stops that activity dead in its tracks. The exploit is captured within our secure virtual container and is prevented from doing harm to the targeted machine and network.

Intelligence

Intelligence

Rich forensic intelligence is captured - in real-time - on all thwarted attacks within the secure virtual container. This information is fed to the Invincea Management Server and then on to a wide variety of other network security controls as desired. We shed light on campaigns launched against your organization as they occur and extend the effectiveness and life of the rest of the defense-in-depth infrastructure.