Threat Intelligence Gateway
The first line of defense:
Check your incoming traffic in real time against millions of Indicators of Attack.
Apply behavior correlation to detect advanced attacks before they hit your firewall.
Prevent false positives, verifiy Indicators of Attack/Compromise with context and behavior.
cognitix Threat Defender integrates transparently on the public side of your firewall to significantly reduce your attack surface.
Industrial Machine Protection
First Line of Defense for your Industry 4.0 / M2M Network
Your industrial machines and applications are criticial for your business.
The best protection is needed but it must not disrupt the business or production processes.
There may be no false positives, no over-blocking and you need full insights into the M2M protocols.
cognitix Threat Defender gives you:
Transparent and seemless integration in new and established production networks
Extended support for M2M protocols in detection and policies
Adaptive behavior baselining to learn and relearn what is normal and what is malicious
Behavior gray-listing to block bad actors while keeping business processes available
In-depth Network Insights
Correlate your network traffic with millions of Indicators of Compromise/Attack from open and commercial threat exchange communities.
Follow the connections from individual indicators seen in your network traffic to attacks, actors and vulnerabilities.
Analyze the network behavior before and after incidents occur, detect behavior changes.
Get instant insights with our real-time reporting, enriched with information from threat intelligence, intrusion detection, URL classification and reputation, geolocation and more.
Real Time Reporting
Automatic Asset Discovery
Detect Behavior of Users and Assets
Beyond "Next Generation": Behavior Firewall
Second Line of Defense to Protect your Network
Deploying a single firewall is not enough anymore. Keeping your network secure requires fine grained control and a demilitarized zone (DMZ) between your company network and the world wide web.
But deploying the same simple mechanisms at both sides of the DMZ only provides limited security.
The next step following "Next Generation" is here: behavior detection and behavior-based policies.
Today's threats hide in legitimite traffic and looking at individual flows is not enough anymore.
Only the correlation of network traffic over time reveals the behavior.
Only the detection of network behavior and behavior changes allows you to discern infected clients and malicious actors from valid business traffic.
Follow the security recommendation by experts like the german BSI and build a DMZ with effective threat protection. Deploy a behavior-based firewall to complement your existing UTM or Next-Generation Firewall.
Get context with Threat Intelligence
Your IPS is only used in degraded mode as IDS, your firewall logs list hundreds of "possible" bad actions for your users, but your situational awareness is not existing?
Verifiy the validity of an IDS-hit or an Indicator of Compromise with the behavior change of a device and significantly reduce the amoun of false-positives.
Give context to your devices behavior with external information from Intrusion Detection, Threat Intelligence, URL Reputation and Classification, Layer 7 Protocol and Layer 7 Application.
Get full situational awareness to see, analyze and react in real time to any threat in your network.
Protecting the inside of your network: Secure Switching
First line of defense inside your network
Protecting the network perimeter alone is not enough anymore:
50-80% of attacks start from the inside of your network
Many devices can not use endpoint security solutions, printers, mobile phones, smart IoT devices are part of your network without any special protection
Dividing a network into micro-segments for each device is not feasible
A transparent security solution inside your network is here! Between your switches, as your new main switch, in front of your most valuable assets, to protect your business-critical legacy control systems: cognitix threat Defender brings you the security you need. Behavior based, inline and at wirespeed.