Suite 444, 320 E Clayton Street Athens, Georgia 30601, USA

BlockCount Ratio

BlockCount Ratio
  • Single-pane-of-glass view on the effectiveness of your existing security systems through log correlation: firewall, sandbox, IPS and endpoint security.

  • Use performance-based quantitative analysis to determine if you are achieving ROI from your existing security investments.

  • Obtain a summary of the ratio of attacks blocked at each layer of your defense-in-depth security infrastructure, and what percentage went through.

Detect. Prevent. Evaluate.

While organizations have long needed to safeguard their IT assets and their sensitive data, new threats and new regulations arise every day. Therefore, organizations need to validate that their existing security investments are always operating to their full potential.

LinkShadow enables you to evaluate the performance of your security devices' detection and prevention capabilities with our Link Luminescence Engine (LLE) that analyzes and correlates information related to blocked threats, and validates the effectiveness of your multi-layered defense-in-depth infrastructure.

Management Dashboard


The management dashboard gives a holistic view on the security posture of your organization. Built to be a completely configurable solution, the management dashboard allows CISO’s to find information they need to monitor and take decisions regarding their network. LinkShadow allows the CISO to monitor the key security metrics in his/her organization by choosing the key metrics that matter to their organization. The dashboard is completely configurable allowing you to choose the widgets that represent the security threatscape of the organization.

  • Single Pane of glass view on the security posture of your organization

  • Identify & monitor key security metrics that matter

  • Compare key security metrics; Quarter to Quarter / Month to Month

  • Enhance CISO decision making capabilities

  • Configure the dashboard as per your preference

Live Shadow


LiveShadow aims to provide CISO with a compilation of all the critical incidents that are taking place at the moment as well as realtime highlights of the critical events detected recently. LiveShadow also provides an intuitive system health summary which CISO can easily refer to in order to understand the overall security situation of the environment.

There are three main sections in the LiveShadow screen; Critical Findings which lists the most risky users and entities detected by the system as well as top machine learning anomalies identified, Realtime Connections which shows number of connections along with number of attacks in realtime view, and Entity and User threat summary which lists the most recent anomalies detected as well as a collective summary of users and entities in the ThreatScore Quadrant.

Clicking on any of the widgets in the LiveShadow screen will navigate to the relevant window showing more information about the user or entity that caused the anomaly.

ThreatScore Quadrant

  • Detect anomalies through behavioral analytics performed on correlated logs and packet analysis using advanced machine learning algorithms.

  • Graphically position all your threats to logically prioritize response to incidents or threats based on severity of risk.

  • Monitor the threat score of your critical assets and to detect anomalous users and entities.

  • Identify entity behavior that is most dangerous to your organization along with a description of the anomaly.

Learn. Score. Prioritize.

New threats emerge every day from inside and outside the perimeter. Detecting these threats that bypass other security controls is important, but predicting their impact is even more crucial. Understanding behavioral patterns and correlating this information enables organizations to identify potential attacks with varying magnitudes of consequences and severity, and then prioritize actions to respond.

LinkShadow performs anomalous behavior detection as all traffic coming in and out of your organization is constantly scanned. Detect threats, learn and adapt to user patterns, and keep track of everything, so that each attack can be scored for proper prioritization. See which entity is most dangerous to the organization by understanding where it can cause a crisis, or is something to be wary of, or should be watched closely, or needs to be acted on immediately.

Identity Intelligence

  • Visual trend analytics on user behavior including authentication patterns, application usage habits, etc.

  • Pin point high risk users based on machine learning and clustering of peer behavioral patterns.

  • Constantly monitor high-profile users by adding them to the 'Watch List', and prioritize alerts on activities of Super Users.

Focus. Analyze. Identify Anomalies.

With increasingly sophisticated malware hitting enterprise networks daily, it is critical to guard the crown jewels effectively to combat these threats, especially, since they are getting more difficult to identify. However, such threats can be averted.

With LinkShadow, organizations can analyze and profile network entities to uncover early signs of a breach, and underlying malicious behavior to pinpoint threat actors hiding in plain sight. Get alerted if a system is misused by detecting whether the entity is behaving normally by comparing historic and current port usage patterns, whether the right protocols are being utilized on accessed ports, and gaining visibility into relationships with other network entities.

Asset AutoDiscovery

  • Automatically discover all devices across your entire network, providing insight into device type and OS, plus validation of whether devices are managed or unmanaged, and whether endpoint security is installed.

  • Use anomaly detection technology built on advanced machine learning, to learn and profile the organization's unique behavior, and alert in real-time on threats that are specific to your network.

  • Visualize device connectivity within your network, and identify whether a device is communicating over the right protocols, with the right port numbers.

Find. Monitor. Alert for Anomalous Behavior.

You may take your eyes off your network, but rest assured we won't. With the dynamic nature of the network environment, it is fundamental to continuously monitor and collect real-time data across systems, to adapt your security program and better protect the business.

LinkShadow allows you to classify nodes through automated discovery of the entire IT infrastructure within the enterprise, to ensure all assets are protected and up-to-date for the compliance audit. Drill down into the details to answer critical questions around how many systems are managed and unmanaged in your network, do they have endpoint security or not, and what is the type of device.

AML Anomaly Detection


AML Anomaly Detection presents CISO with an overall compilation of threats from all the Machine Learning algorithms built into the system, allowing CISO to focus on real threats that matters. AML Anomaly Detection helps CISO draw the line between false positives and critical incidents. Using intelligent threat scoring and collective profiling of entities and users, AML Anomaly Detection identifies risks taking place in the environment right now and presents CISO with visual representation indicating where did the risk originate from as well as where is it heading to.

AML Anomaly Detection allows CISO to compare the current security posture with previous dates to verify if certain threats are persisting across time. This feature helps CISO to identify the riskiest assets and users as well as evaluate the efficiency of other security systems such as firewalls and endpoint security.

The AI-Powered Engine

AI-Powered Engine

Ever wondered how Anomalies are detected in AI-based Security tools? What triggers the detection? What Machine Learning Algorithms are running? And how do these algorithms work? Right now, most of these AI-based Security tools are just a black box for the average customer.

We at LinkShadow decided to change the view on how AI/ML is used in cybersecurity. LinkShadow's AI-Powered Engine simplifies the complexity of Machine Learning and AI-based tools by empowering Security Teams to have full control over the process, right from the collection and enrichment to creating detection models and visualization.

Shadow 360


Shadow 360 gives complete visibility around any activity that raises a flag. Any anomalous trigger can be studied in depth through a specter graph, which entails the history of fluctuations in user activity. This allows the analyst to determine the criticality of any event whether from the past or present.

Shadow 360 has an advanced time series analytics that uses a Session Data model also known as session serialization; it automatically stitches together incident timelines including both normal and abnormal user activity, for all threats detected. This reduces the manual effort security analysts spend on investigations and increases their productivity. As each entity in the organization is linked and correlated with the kill chain stage it is in, and hence can act as predictive analytics to block a future breach. The security analyst can then go ahead and act to stop an attack before it actually takes place.


  • BlockCount Ratio
  • Management Dashboard
  • Live Shadow
  • ThreatScore Quadrant
  • Identity Intelligence
  • Asset AutoDiscovery
  • AML Anomaly Detection
  • AI-Powered Engine
  • Shadow 360