Automated Penetration Testing
The Shield-CyBot solution is like an autonomous robot patrolling your network day and night using context analysis scanning. It focuses on your network vulnerabilities and attack path scenarios that can be exploited by hackers. In doing so we greatly reduce the resources needed for patching and ensuring business continuity. Shield-CyBot performs like a watchdog continuously scanning your network 24/7. Penetration tests and attack path scenarios are developed and updated every few weeks. A visual road map is also created to quickly see vulnerabilities and attack path scenarios across all of the organization’s networks.
Defence From Malware and Zero-Day Attacks
We defeat and quarantine the evil zero-day malware beasts hiding or encrypted deep inside the data streams of common applications. The source of many cyber-attacks, malware attacks use application exploits to gain entry to your network. Malware of this type shares a common denominator: code traveling in and out of the network. The patent-pending DvC (Data versus Code) technology detects hidden code within data objects. Shield-Gate doesn’t care about the data object type or what the code looks like it simply blocks the malicious content from entering your organization. If a stream includes code, it stays out. Period.
Authenticate and Verify User Access
Shield-SDA is a force field throwing up a radioactive brick wall: data gets out but nothing gets in. It is essentially a firewall in a constant deny-all state. Access doesn’t require open ports. Also a VPN is not needed because bi-directional traffic is handled on outbound connections from the LAN to the outside world. Shield-SDA provides client-less access to applications and data. It uses robust multi-factor authentication. Access is provided only to the defined application/service thus blocking general network access. So users access only the application or service they need; not the entire network!