How you can easily scale your code while saving costs with Continuous DevOps

Deploying code can be a hassle: unstable environments, unhappy customers and high administration costs due to the long service time required. But with Continuous DevOps you can integrate code fast and easily while stabilizing your services and keeping your customers happy. DevOps is key to achieving the integration of code within your software operation, while continuous methods save a lot of time through automated testing and deployment. With the right tools you can even scale your code and...

Read More

Don’t Get Left Out in the Cold

cognitix Threat Defender enhances its IPS capabilities with Indicators of Compromise (IoC) feeds to identify a range of possible attacks. This threat intelligence is used to prevent these attacks. To successfully counteract and prevent attacks, it helps to know when you’re being targeted in the first place. cognitix Threat Defender enhances its IPS capabilities with Indicators of Compromise (IoC) feeds to identify a range of possible attacks. This threat intelligence is used in conjunction...

Read More

Dynamic Network Segmentation

Blog If You’re Not in Real Time, You Have to Suffer

Dynamic network objects protect the network by automatically adapting to behavioral anomalies in the network. The automatic reaction to incidents frees administrators from manual intervention. Both enriched and dynamic networks objects are used in firewall rules. Enriched network objects are static and require human intervention to be modified. Dynamic network objects categorize devices on the fly and in real time based on the legitimacy (or harmfulness) of the device behavior. Based on the...

Read More

Application Detection

Judge Me by My Acts and Not My Words

cognitix Threat Defender detects changes in network behavior and reacts automatically in real time using behavior-based policies. It filters the network traffic for specific behavior patterns. Threat Defender analyzes the network in real time and correlates millions of network traffic events over time and across network flows to detect patterns and connections between seemingly unrelated communication events. Threat Defender sets up policies and complex rule scenarios to manage network traffic...

Read More

Security Is a Moving Target

Network segmentation is implemented to contain threats and reduce the attack surface. cognitix uses enriched network objects to add a logical overlay network to provide additional segmentation. Network segmentation is implemented in networks to contain threats, reduce the attack surface and to provide points of control. Segmentation uses the physical network topology. It is typically enforced on layer 3 using firewalls in routers to manage the lateral traffic flows within the network. cognitix...

Read More

Battling Botnets

Due to their surge in 2017 cryptocurrencies have been prominent in the news. Their mounting success and value had a downside. Lately, botnets have increasingly been used for crypto mining. Botnets contain various types of Internet-connected devices, such as clients, servers, mobile devices and Internet of Things (IoT) devices that have been infected by a common type of malware. They are remotely controlled by the operators of the botnet and used for their specific purposes, from sending spam...

Read More

New Threat Defender release including IoC feeds

You Cannot Fight What You Cannot See

The potency of advanced persistent threats has changed the focus for a robust defense posture. A corrective strategy includes remedial and preventive actions. Attacks to the network are gaining in sophistication. The potency of advanced persistent threats has changed the focus for a robust defense posture. Malicious content is camouflaged within legitimate behavior, disassembled, time-shifted and sent in innocuous fragments. To be then introduced into the network via a myriad of channels and...

Read More

How Threat Defender deals with malware and spam

I Put a Layer 2 Analyzer in My Network: You Won’t Believe the Things I Found

Gathering information on layer 2, you see external and internal traffic flows results in a reporting system that details over 600 parameters and metric combinations with virtually endless drill-down. The provision of timely, accurate and comprehensive data is essential for network hygiene. The traffic data is accessed at neuralgic points within the network to paint a complete picture of the behavior of each device. Detecting the communication activities of each device ensures the quality of the...

Read More

Now You See Me, Now You Don’t.

cognitix Threat Defender is incorporated as a next generation firewall into a layer 2 device. This new approach makes the firewall a part of the very fabric of the network. Threat Defender is invisible, or transparent to the network. It acts as a “bump in the wire” with no perceptible effect on the throughput or latency. The device is inserted in the cable between existing devices at any point within the network. It still accesses the layer 7 classification, IPS, URL classification, inline...

Read More

How Threat Defender deals with malware and spam

How to deal with malware and spam in particular?

There is a multitude of attack scenarios using malicious software, making it virtually impossible to completely protect any company network from malware. For example, since the Spectre and Meltdown vulnerabilities became public, attackers have been spreading emails with malware attachments that appear as if they were sent by authorities. The senders claim that the email attachments contained security patches for Spectre and Meltdown. These emails look deceptively real. So no matter how much...

Read More

Share on

Recent posts

How you can easily scale your code while saving costs with Continuous DevOps

Deploying code can be a hassle: unstable environments, unhappy customers and high administration...

Don’t Get Left Out in the Cold

cognitix Threat Defender enhances its IPS capabilities with Indicators of Compromise (IoC) feeds to...

Blog If You’re Not in Real Time, You Have to Suffer

Dynamic network objects protect the network by automatically adapting to behavioral anomalies in the...

RSS

Sign up for our newsletter: