The network perimeter is not your frontline anymore.
The Network Perimeter is porous and no longer secure. Hacker’s tactics and the threat landscape evolve so rapidly that they easily evade static security controls and signature-based detection solutions such as IDS, IPS and NGFW. Major cyber threats use attack vectors, such as HTTP, HTTPS, POP3, or IMAP, that are difficult to inspect because they are mostly encrypted and even harder to block without disrupting your business. It is no longer possible to secure the perimeter of the network and it is only a question of time before threats enter your network.
A new approach is needed which does not solely rely on signature detection but instead uses machine learning, behavior-based analytics, real-time feeds of threat indicators of compromise (IoCs) and protocol and application detection on OSI layers 2 to 7 to detect, analyze and block cyber threats before they enter the network and to isolate cyber threats when they already exist in the network. In brief, what is needed is an inline real-time threat intelligence and protection platform.
Threat Intelligence and Protection
cognitix has developed the world’s first active inline, real-time Threat Intelligence and Protection platform that analyzes the network traffic in real time at wire speed to detect cyber threats using Indicators of Compromise (IoCs ).
IoCs are a collection of IPs, URLs, domains, file signatures or fingerprints, emails which are known to belong to hackers and other malicious actors and which should be detected and blocked at all costs. cognitix uses a multitude of open source and commercial cyber threat feeds to continuously update its IoC database on a per-minute basis. This ensures that your network will be protected against the latest threats and vulnerabilities at all times.
Inline Real Time
Based in Leipzig, Germany, cognitix has developed the world fist high-performance active inline, real-time Threat Intelligence and protection platform. Our products use innovative technologies such as a single-pass behavior-based packet processing engine capable of inline real-time correlation, dynamic behavior-based network segmentation, layer 7/8 application detection and machine learning analytics to ensure effective and affordable Threat Intelligence and Protection.