The perimeter is not your frontline anymore!
The Network Perimeter is porous and no longer secure. Hacker’s tactics and the threat landscape evolve so rapidly that they easily evade static security controls and signature-based detection solutions such as IDS, IPS and NGFW. Major cyber-threats use attack vectors such as HTTP, HTTPS, POP3, or IMAP that are difficult to inspect because they are mostly encrypted and even harder to block without disrupting your business. It is no longer possible to secure the perimeter of the network and it is only a question of time before threats enter your network.
A new approach is needed which does not solely rely on signature detection and instead use machine learning, behavior based analytics, real-time feeds of threat indicators of compromise (IoCs) and OSI-layers 2 to 7 protocol and application detection to detect, analyze and block cyber-threats before they enter the network and isolate cyber-threats when they already exist in the network. In brief, what is needed is an inline real-time threat intelligence and protection platform.
Threat Intelligence and Protection Platform
cognitix has developed the world’s first Inline-, real-time cyber-threat intelligence and protection platform. cognitix’ solutions provide a multi-layered architecture that combines the functionalities of IPS, NGFW, SIEM and TI that operates inline and acts in real-time on traffic using machine learning technologies and the world’s first inline, real-time behavior-based correlation engine. cognitix’ solutions enable enterprises to detect cyber-threats in real-time and inline at wire-speed.
Threat Intelligence and Protection
cognitix has developed the world’s first active inline, real-time Threat Intelligence and Protection platform that analyses the network traffic in real-time at wire-speed to detect cyber-threats using Indicators of Compromise (IoCs ).
IoCs are a collection of IPs, URL, domains, file signatures or fingerprints, emails which are known to belong to hackers and other malicious actors and which should be detected and blocked at all costs. cognitix uses a multitude of open source and commercial cyber-threat feeds to continuously update its IoC database on a per-minute basis. This ensures that your network will be protected at all time against the latest threats and vulnerabilities.
With cognitix’ integrated suite of products, enterprises will gain in-depth visibility, reports and analysis of their networks to detect and block threats either before they enter the network or if they are already in the network.
Inline, Real-time Threat Intelligence and Protection Platform using behavior-based Correlation
cognitix’ innovative Threat Defender uses the world’s first inline real-time packet processing engine, that utilizes a behavior basedcorrelation engine to analyze and correlate millions of flows, network events and indicators of compromise inline and in real-time to detect hidden behaviors and patterns that may be indicative of attacks.
cognitix’ Threat Defender uses inline real-time correlation to evaluate scenarios for each network flow. With behavior based correlation, you can build complex policies of multi-staged rules to detect similar or related events in all network flows, inline at wire-speed.
Threat Intelligence and Protection using Machine Learning
cognitix’ team of in-house data scientists has developed specialized machine learning algorithms to detect and discover hidden patterns and behaviors inside the network. cognitix Threat Defender, Threat Central and Threat Graph use machine learning to enable enterprises to gain unparalleled visibility into their network behavior and understand the behavior of users and devices.
Based in Leipzig, Germany, cognitix has developed the world fist high-performance active inline, real-time Threat Intelligence and protection platform. Our products use innovative technologies such as a single-pass behavior based packet-processing engine capable of inline real-time correlation, dynamic network behavior-based network segmentation, layer-7/8 application detection and machine learning analytics to ensure an effective and affordable Threat Intelligence and Protection.