Home » vendors

Category Archives: vendors

Intelici

Launch Intelici Service

Intelici’s next-generation cyber-threat detection technology is based on the use of artificial intelligence to analyze the propagation patterns of malicious network traffic at the ISP level, with no need to access, analyze or filter the traffic’s content. Intelici’s solution is unlike any other system on the market and offers unparalleled advantages to ISPs and enterprise alike, including:

  • Prevents attacks weeks or months before they occur, by identifying malicious objects that are laying the groundwork for an attack
  • Identifies never-seen-before cyber-attacks within hours instead of weeks or months
  • Identifies and prevents cyber-attacks contained in encrypted network traffic
  • Rapid preemptive protection of enterprise networks operating in particular industries
  • Prevent bad actors from testing or simulating new malware against defenses to tweak it to avoid detection
  • No need to constantly “play catch up” with hackers via new field by the Intelici system.

FastNetMon Advanced

gear-icon

Check FNM graphs on Grafana

  • Ability to detect and filter out only malicious traffic flowing into or from your network.
  • Flexible detection engine with support for DoS/DDoS attack types: amplification (NTP, SNMP, SSDP, DNS, GRE, chargen and other), floods (UDP, TCP, ICMP), attacks on tcp protocol (syn, syn-ack, fin floods), attacks on IP protocol (fragmented packets) and other. Including support for multi-vector attacks.
  • Very fast detection time: 1 second for sFlow 5 and port mirror mode and 5- 45 seconds for Netflow/IPFIX (depends in device model).
  • Scalable up to Terabits (multiple existing deployments with 1+ Tbps of traffic).

Fidelis Elevate

gear-icon

Launch Fidelis Elevate Service

Fidelis Elevate provides a terrain based cyber defense that shines a light on the blind spots in your environment and calculates your vulnerable attack surface. Now you know what to protect and the most probable paths of data exfiltration, command and control, surveillance and more. And through the network and endpoint metadata that we collect, you gain the content and context required for real-time and retrospective analysis that is critical for detection, threat hunting, and response.

Wirex – Security Investigation Framework

gear-icon                     

Launch Wirex Service

WireX automates analysis efforts so that security professionals at all skill levels; security managers, SOC operators, analysts and incident responders – can make faster and more informed decisions based on the actual content of network conversations, rather than just the metadata.

L7Defense WEB DDoS attacks Protection

gear-icon                         

Launch L7Defense Service

Launch L7Defense Service – new

L7Defense Defense against DDoS attacks Like the Ammune Platform
An automated platform protecting HTTP / HTTPS traffic
from signature-less application DDoS attacks in Real-Time

BGPmon

gear-icon     bgpmon-1

Launch BPGmon Service

Route monitoring has been our primary service for many years. BGPmon has evolved over time and is recognized for its accuracy, speed and feature richness. BGPMon route monitoring service alerts users in cases of anomalies with any of your prefixes, policy violations, instability, ROA validation failures and more.  It also provides reporting features such as the daily routing report customized for your networks.

Farsight PassiveDNS

gear-icon

Launch PassiveDNS Service

 

Domain Name System (DNS) is used for every transaction on the Internet, good or bad. Farsight Security, Inc. provides a comprehensive set of solutions that provide real-time and historical information about the everchanging Global DNS. By enriching your existing Threat Intelligence with our data, you can more quickly detect, respond and prevent the next cyberattack and protect your business.

DNSDB

Farsight DNSDB is the largest, most proven real-time and historical collection of Passive DNS data available in the market today. DNSDB can provide information about threat actors and their motives by answering such questions as: What domain names map to “this” IP address, now and in the past? When was “this” name first used and by whom? What domain names share this same MX record? Learn more about our latest integration with Splunk and how DNSDB works.

Ixia Traffic Broker

ixia - Copygear-icon

Launch X40 Traffic Broker

Launch X10 Traffic Broker

Ixia provides total visibility across the physical and virtual networks so security teams and tools make exactly the right decisions at exactly the right time.

FireEye NX

fireeyelogogear-icon

Launch FireEye Service

FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution™ (MVX) engine, conventional intrusion prevention system (IPS)and intelligence-driven detection. This enables faster detection, more accurate alerts and reduced noise. Identifying threats traditional security solutions can’t allows you to focus on alerts that pose a genuine threat and reduce the operational cost of false positives.

SoleGATE Mail Protection

solebitgear-icon

Launch Solebit Service

SoleGATE Email Protector is a virtual appliance, installed on cloud or on-premises, that detects and prevents cyber-attacks over the email attack vector, before they even enter the organization’s internal networks. One of the SoleGATE Protection Platform modules, SoleGATE Email Protector powered is by Solebit DvC Engine, uses patent-pending static analysis technology to inspect the email traffic for hidden code inside data objects, providing a conclusive result for each scanned email.

Solebit SoleGATE platform uses an innovative non-behavioral and conclusive approach to cybersecurity protection.
Solebit’s patent-pending DvC technology detects hidden code within data objects, regardless of the data object type and what the code looks like, then blocks the data object from entering the organization.
If a stream includes code, it stays out.