Welcome Xcellator

XcellSecure SM | Cloud Endpoint Detection & Response

Switch between buying licenses upfront to a pay-as-you-go monthly subscription licenses

Prevent Incidents, Data Loss, Ransomware, Malware, Breaches with complete attack prevention & detection.

Uncover & Stop Elusive Threats with Agility & Precision

7 Days Free Trial Schedule Demo Take Tour Datasheet

unmanaged

₹ 199 per user

on sale - Save 15%

order now
  • Automated Threat Detection
  • Assest & Application Discovery
  • AI Analysis
  • Vulnerabilities & Reports
  • Enhanced Assest Reporting
  • API Access & Integration

managed

₹ 289 per user

on sale - Save 15%

order now
  • Automated Threat Detection
  • Assest & Application Discovery
  • AI Analysis
  • Vulnerabilities & Reports
  • Enhanced Assest Reporting
  • API Access & Integration
  • 24x7 Manged Security Services
  • On-Demand Incident Response
  • Expert Threat & Malware Analysis

APEX ONE™ DELIVERS

Integrated EDR and Endpoint Protection

Integrated EDR and Endpoint Protection capabilities means no more console hopping between protection points.

Virtual Patching With The Most Timely Patches

Virtual patching with the most timely patches means Trend provides faster protection from vulnerabilities than any other vendor

A Single Lightweight Agent

A single lightweight agent lets customers deploy full endpoint protection suites including EDR and MDR from a single lightweight agent.

All-In-One Protection

All-in-one protection from a single vendor with a single lightweight agent. Apex One™ as a Service offers feature parity with onpremises versions of the Smart Protection Suites

Threat Detection Capabilities

High-fidelity machine learning (preexecution and runtime)
Exploit prevention (host firewall, exploit protection)
Behavioral analysis (against scripts, injection, ransomware, memory, and browser attacks)
Endpoint encryption (requires separate agent)
File reputation
Device control
Variant protection
Good file check
Census check
Sandbox and breach detection integration
Web reputation
Detection and response
Command and control (C&C) blocking
Vulnerability protection
DLP

You Can Have it all

Advanced malware and ransomware protection

Defends endpoints—on or off the corporate network—against malware, trojans, worms, spyware, ransomware, and adapts to protect against new unknown variants and advanced threats like cryptomalware and fileless malware.

Detection and response capabilities

Advanced detection and response capabilities are included with Apex One. An optional investigation tool; Trend Micro Endpoint Sensor, and our MDR service are available as add-ons.

Mobile security integration

Integrate Trend Micro™ Mobile Security™ and Apex One by using Apex Central to centralize security management and policy deployment across all endpoints. Mobile Security includes mobile device threat protection, mobile app management, mobile device management (MDM), and data protection.

Connected threat defense

Apex One integrates with other security products locally—on your network and also via Trend Micro’s global cloud threat intelligence—to deliver network sandbox rapid response updates to endpoints when a new threat is detected. This enables faster time-to-protection and reduces the spread of malware

Centralized visibility and control

When deployed with Trend Micro Apex Central™, multiple capabilities can be managed through a single console to provide central visibility and control across all functions

The industry’s most timely virtual patching

Trend Micro Apex One™ Vulnerability Protection™ virtually patches known and unknown vulnerabilities, giving you instant protection before a patch is available or deployable.

Available on-premises or as a service

Apex One can be deployed on-site in your network or is available as a service, with full product parity between the two deployment options.

Maximum XGen™ security

Infuses high-fidelity machine learning with other advanced detection techniques for thebroadest protection against ransomware and advanced attacks.

MicrosoftTeams-image (66)

  • Progressively filters out threats using the most efficient technique for maximum detection without false positives.
  • Blends signatureless techniques, including high-fidelity machine learning, behavioral analysis, variant protection, census check, application control, exploit prevention, and goodfile check with other techniques like file reputation, web reputation, and C&C blocking.
  • Trend Micro is the first to infuse high-fidelity machine learning, which uniquely analyzes files not only before execution but also during runtime—for more accurate detection.
  • Noise cancellation techniques like census and whitelist checking at each layer reduce false positives
  • Instantly shares information on suspicious network activity and files with other security layers to stop subsequent attacks.
  • Advanced ransomware protection monitors for suspicious file encryption activities at the endpoint, terminates malicious activities, and even recovers lost files if necessary

Quick, Automated Protection = Reduced Impact, Less Investigations

MicrosoftTeams-image (67)

OUR SERVICES

Rapid Detection service is an enterprise-grade managed service that detects, quantifies & gathers evidence regarding advanced attacks

support-icon

24x7 Support

Experienced threats hunters from XcedllHost watching over your environment 24/7

Fast_Response-512

Quick Response

Max 30 minutes from breach detection to response, as agreed in a service level agreement

1429535

Guidance

High quality detection’s, with actionable response guidance by XcellHostexperts

WHY MOVE TO EDR

move-to-edr

USE CASES

shield

Block Ransomeware

misconfiguration

Advanced Threat Protection

Cross Site Script

Exploit prevention- Zero day Vulnerability

insecure

Data Center Security

data example

Clean up-Automatic Remediation

auth

Security For Hybrid Enviornment

FREQUENTLY ASKED QUESTIONS

The VectorN Detection engine is a new feature and its purpose is to search for patterns within the blocks that Thor's Traffic Scanning records. 

  • It works across-the-board on any Windows™ device;
  • It does not rely on scanning the code or auditing any system processes. Instead, the new technology uses Machine Learning Detection (MLD) to perform an in-depth analysis of all incoming and outgoing HTTP, HTTPS and DNS traffic.
  • It matches Machine Learning (MLD) insights with Indicators of compromise/attack (IOC/IOA) and network forensics, turning Thor Foresight into a unique, proactive cybersecurity suite.
  • It helps users discover even hidden, second-generation malware that tries to infect the endpoint or attempts to harvest data from the compromised system.
  • By tracking device-to-infrastructure communication, this technology enables users to detect and block advanced malware, regardless of the attack vector.

Example: 

If Thor Foresight's Traffic Scanning is blocking a specific domain or multiple domains at a specific time of the day, VectorN Detection will consider this a pattern and will inform the user that there might be a possible threat. 

Patterns:

- A domain is blocked multiple times a day in a very short time period.

- A domain is blocked every day at a specific time 

- Multiple domains are blocked in a very short time period. 

Thor Premium product line-up includes 2 main product branches: Thor Foresight and Thor Vigilance. The products complement each other, and they should be combined in order to offer maximum system and network protection. 

Thor Foresight has been specifically designed to protect you from financial and data-stealing malware while doing banking operations and keep you safe from Zero Hour malware and security exploits frequently employed by IT, criminals.

  1. When Thor is installed your local DNS is changed to 127.7.7.x and your DNS server is saved by Thor in the registries.
  2. Four new services will be activated: Heimdal Antivirus, Heimdal Client Host, Heimdal DarkLayer Guard and Heimdal Uptime Checker, all of them set to Automatic
  3. Two new folders will be created, one in Program Files or Program File (x86), depending on the OS architecture and one in ProgramData.
  4. One icon in the Taskbar
  5. One certificate in the Trusted People folder.

In case you suspect that your antivirus is interfering with Heimdal Security’s functionality, you’ll need to add some exceptions to allow Thor to work properly.

Here are some examples of potential interferences:

The Heimdal services do not start at Windows’s start-up or the network adapter’s DNS 127.0.0.1 is not set for some reason even if the Traffic Scanning is ON.

The files you need to add are located in this path: C:\Program Files (x86)\Heimdal (you need to add them one by one) 

- Heimdal.Agent​​
- Heimdal.AgentLoader​​
- Heimdal.ClientHost​​
- Heimdal.SecureDNS​
- Heimdal.UptimeChecker.exe
- Heimdal.AgentError.exe

Restart the computer and check if everything is working as it should!

  1. When Thor is installed your local DNS is changed to 127.7.7.x and your DNS server is saved by Thor in the registries.
  2. Four new services will be activated: Heimdal Antivirus, Heimdal Client Host, Heimdal DarkLayer Guard and Heimdal Uptime Checker, all of them set to Automatic
  3. Two new folders will be created, one in Program Files or Program File (x86), depending on the OS architecture and one in ProgramData.
  4. One icon in the Taskbar
  5. One certificate in the Trusted People folder.

CLOUD ENDPOINT SECURITY RESOURCES

RELATED TO ITEM YOU HAVE VIEWED...

Performance Cloud-1

Performance Cloud

Simplify your cloud infrastructure with XcellHost robust set of tools to develop, deploy, and scale your applications faster and easier.

Dedicated GPU Cloud

GPU Cloud

Accelerate your machine learning and deep learning workloads with Tesla V100 and Nvidia T4 based GPU instances.

Bare metal Cloud

Bare Metal Cloud

Experience bare-metal performance on Cloud with zero noisy neighbor problem, and reliable performance.