The network perimeter is not your frontline anymore!
The Network Perimeter is porous and no longer secure. Hacker’s tactics and the threat landscape evolve so rapidly that they easily evade static security controls and signature-based detection solutions such as IDS, IPS and NGFW. Major cyber-threats use attack vectors such as HTTP, HTTPS, POP3, or IMAP that are difficult to inspect because they are mostly encrypted and even harder to block without disrupting your business. It is no longer possible to secure the perimeter of the network and it is only a question of time before threats enter your network.
A new approach is needed which does not solely rely on signature detection and instead use machine learning, behavior based analytics, real-time feeds of threat indicators of compromise (IoCs) and OSI-layers 2 to 7 protocol and application detection to detect, analyze and block cyber-threats before they enter the network and isolate cyber-threats when they already exist in the network. In brief, what is needed is an inline real-time threat intelligence and protection platform.
Threat Intelligence and Protection
cognitix has developed the world’s first active inline, real-time Threat Intelligence and Protection platform that analyses the network traffic in real-time at wire-speed to detect cyber-threats using Indicators of Compromise (IoCs ).
IoCs are a collection of IPs, URL, domains, file signatures or fingerprints, emails which are known to belong to hackers and other malicious actors and which should be detected and blocked at all costs. cognitix uses a multitude of open source and commercial cyber-threat feeds to continuously update its IoC database on a per-minute basis. This ensures that your network will be protected at all time against the latest threats and vulnerabilities.
Based in Leipzig, Germany, cognitix has developed the world fist high-performance active inline, real-time Threat Intelligence and protection platform. Our products use innovative technologies such as a single-pass behavior based packet-processing engine capable of inline real-time correlation, dynamic network behavior-based network segmentation, layer-7/8 application detection and machine learning analytics to ensure an effective and affordable Threat Intelligence and Protection.