Industry 4.0 / Machine to Machine

Protect Machine-to-Machine Communication Networks with Threat Defender:

  • Low-latency inline real-time data processing in single-pass engine

  • Traffic correlation to understand behavior of devices

  • Detect intrusions via behavior changes and malicious behavior

  • Correlate behavior with external threat exchange (Indicators of Compromise and corresponding intelligence) and pattern-based intrusion detection

  • Optional gray-listing policies to prevent overblocking from false-positives: block malicious behavior, let business critical traffic pass

  • Understand Industrial Communication Protocols like SCADA, IEC16850, Siemens S7 and more

  • Transparent integration into existing networks with no changes required

  • Out-band administration for high security

More


Protecting Business Critical Operations

As first line of Defense before your router or as second line of defense within your core network: Threat Defender integrates transparently to detect and block malicious behavior, defend against known attacks via IDS patterns and Indicators of Attack and Indicators of Compromise.

  • High speed single pass engine

  • Deep insights into network and device behavior

  • Data enrichment with information from external sources (Threat Intelligence Exchange, Intrusion Detection, URL Reputation and Categorization, Geolocation, Layer 7 Application detection)

  • Situational awareness of network behavior and threats

  • Fine grained behavior based micro segmentation and policing / access-control


Trust in Your Network

Combine Threat Defender, Threat Central and Threat Analysis to unleash the full power of the cognitix solution:

  • Protect your company network from the inside (50-80% of attacks start inside the network)

  • Detect behavior and changes of behavior, prevent threats from unfolding and contain horizontal spread in real-time

  • Combine the power of pattern based Intrusion Detection, Indicators of Compromise from Threat Intelligence and behavior detection on the network traffic

  • Attribute behavior to users with Integration in Active Directory and other IAM systems

  • Analyze and police behavior of assets and users to protect what is important and keep business critical processes available

  • Combine the knowledge and intelligence of all individual Threat Defenders in the central management and reporting system

  • Analyze network and device behavior across the whole network with machine learning and graph analysis


Get our newsletter

Subscribe to our mailing list

* indicates required

cognitix GmbH will use the information you provide on this form to be in touch with you and to provide updates and marketing. Please let us know all the ways you would like to hear from us:

You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at noreply@cognitix.de. We will treat your information with respect. For more information about our privacy practices please visit our website. By clicking below, you agree that we may process your information in accordance with these terms.

We use MailChimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to MailChimp for processing. Learn more about MailChimp's privacy practices here.