Most used resources

Navigation in Myrmex is designed to dynamically adapt to the user interface, providing a fluid and intuitive experience. Depending on the size of your navigation window, elements can automatically adjust to optimize usability and access to essential functionalities.

Cybersecurity assistant

Hero Light
When you log in, you are greeted by MYRMEX AI, the platform’s conversational assistant. With it, you can perform a wide range of actions.

Dashboard

Hero Light
You can monitor and visualize consolidated information through dynamic graphs and reports in real time.
  1. Predefined dashboards for quick visualization of common data;
  2. Creation of customized dashboards with configurable graphs to meet the specific needs of your operation.

Environments

Hero Light
The integrations screen, also called Environments, allows centralized management of:
  • Agents installed in the environment;
  • Active integrations with other security systems or services. This area is essential for maintaining control and configuration of the components connected to Myrmex.

Log Management

Hero Light
Log management in Myrmex allows detailed viewing of all raw data sent to the platform, whether from agents or integrations, enabling technical investigations and audits.

Alerts

Hero Light
Alerts in Myrmex present security events consolidated by MYRMEX AI, generated by computers, servers and integrations in your infrastructure and services. Alerts contain the following information:
  • Tactics used by the attacker;
  • Threat details;
  • The investigation carried out by MYRMEX AI, as well as its recommendations.
With this functional organization, MYRMEX offers clear and effective navigation, ensuring that all tools and information are accessible to effectively protect your environment.

Alert Details

Hero Light
Alert details provide incident detection, analysis, and response capabilities, allowing cybersecurity teams to prioritize alerts based on severity, investigate suspicious activity through detailed logs and threat intelligence, and take direct actions such as blocking IPs or assigning tasks.
  • Suspicious Activity Analysis: Identifies unauthorized access attempts, such as Brute Force and Credential Stuffing attacks.
  • MITRE ATT&CK Integration: Classifies incidents based on recognized techniques (e.g., T1110).
  • Automatic Log Analysis: Reviews authentication data, logs, and patterns to determine the source and impact of security events.