Threat Intelligence Gateway

The first line of defense:

  • Check your incoming traffic in real time against millions of Indicators of Attack.

  • Apply behavior correlation to detect advanced attacks before they hit your firewall.

  • Prevent false positives, verifiy Indicators of Attack/Compromise with context and behavior.

cognitix Threat Defender integrates transparently on the public side of your firewall to significantly reduce your attack surface.


Industrial Machine Protection

First Line of Defense for your Industry 4.0 / M2M Network

Your industrial machines and applications are criticial for your business.

The best protection is needed but it must not disrupt the business or production processes.

There may be no false positives, no over-blocking and you need full insights into the M2M protocols.

cognitix Threat Defender gives you:

  • Transparent and seemless integration in new and established production networks

  • Extended support for M2M protocols in detection and policies

  • Adaptive behavior baselining to learn and relearn what is normal and what is malicious

  • Behavior gray-listing to block bad actors while keeping business processes available

Learn more about cognitix in M2M contexts


In-depth Network Insights

  • Correlate your network traffic with millions of Indicators of Compromise/Attack from open and commercial threat exchange communities.

  • Follow the connections from individual indicators seen in your network traffic to attacks, actors and vulnerabilities.

  • Analyze the network behavior before and after incidents occur, detect behavior changes.

  • Get instant insights with our real-time reporting, enriched with information from threat intelligence, intrusion detection, URL classification and reputation, geolocation and more.

Real Time Reporting

Automatic Asset Discovery

Detect Behavior of Users and Assets

Threat Intelligence


Beyond "Next Generation": Behavior Firewall

Second Line of Defense to Protect your Network

Deploying a single firewall is not enough anymore. Keeping your network secure requires fine grained control and a demilitarized zone (DMZ) between your company network and the world wide web.

But deploying the same simple mechanisms at both sides of the DMZ only provides limited security.

The next step following "Next Generation" is here: behavior detection and behavior-based policies.

  • Today's threats hide in legitimite traffic and looking at individual flows is not enough anymore.

  • Only the correlation of network traffic over time reveals the behavior.

  • Only the detection of network behavior and behavior changes allows you to discern infected clients and malicious actors from valid business traffic.

Follow the security recommendation by experts like the german BSI and build a DMZ with effective threat protection. Deploy a behavior-based firewall to complement your existing UTM or Next-Generation Firewall.

Get context with Threat Intelligence

Your IPS is only used in degraded mode as IDS, your firewall logs list hundreds of "possible" bad actions for your users, but your situational awareness is not existing?

  • Verifiy the validity of an IDS-hit or an Indicator of Compromise with the behavior change of a device and significantly reduce the amoun of false-positives.

  • Give context to your devices behavior with external information from Intrusion Detection, Threat Intelligence, URL Reputation and Classification, Layer 7 Protocol and Layer 7 Application.

  • Get full situational awareness to see, analyze and react in real time to any threat in your network.


Protecting the inside of your network: Secure Switching

First line of defense inside your network

Protecting the network perimeter alone is not enough anymore:

  • 50-80% of attacks start from the inside of your network

  • Many devices can not use endpoint security solutions, printers, mobile phones, smart IoT devices are part of your network without any special protection

  • Dividing a network into micro-segments for each device is not feasible

A transparent security solution inside your network is here! Between your switches, as your new main switch, in front of your most valuable assets, to protect your business-critical legacy control systems: cognitix threat Defender brings you the security you need. Behavior based, inline and at wirespeed.


Get our newsletter

Subscribe to our mailing list

* indicates required

cognitix GmbH will use the information you provide on this form to be in touch with you and to provide updates and marketing. Please let us know all the ways you would like to hear from us:

You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at noreply@cognitix.de. We will treat your information with respect. For more information about our privacy practices please visit our website. By clicking below, you agree that we may process your information in accordance with these terms.

We use MailChimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to MailChimp for processing. Learn more about MailChimp's privacy practices here.