InfoWatch Attack Killer includes 4 modules:
early detection of targeted attacks - Targeted Attack Detector in
protection against DDoS-attacks and hacking - AntiDDoS and Web Application Firewall
and Vulnerability Scanner source code - the Custom Code the Scanner
WAF
IW Attack Killer Web Application Firewall - to prevent hacker attacks and detection of Web infrastructure vulnerabilities
- - Automatically adapts to the web resource organization
- - Blocks attempted exploitation of vulnerabilities to fix their programmers
- - Check the level of criticality of the vulnerabilities found by the CCS, and thus reduces the number of false positives to zero
- - Sharing with AntiDDoS can block hacker needs at the level of network filtering nodes, reducing the load on the application
AntiDDoS
IW Attack Killer AntiDDoS - module to detect and prevent DDoS-attacks
- Provides continuous protection of the site automatically and requires no additional action from the user
- Neutralizes DDoS-attack in its "embryonic"
- Ensures the availability of resources, even if the problem occurs on the level of hosting-or ISP
- Works on all OSI protocol stack levels, focusing on the application layer
TAD
IW Targeted Attack Detector - The module of tracking down targeted attacks
- - Identifies-targeted attacks and to minimize the financial and reputational risks
- - Provides continuous monitoring of information systems
- - Just categorizes-targeted attacks, due to the unique technology anomaly analysis
- - Simple and easy to set up and use
CCS
IW Attack Killer Custom Code Scanner - search for application vulnerabilities based on source code analysis
- - Automates the process of finding vulnerabilities in source code
- - Supports all the most famous programming languages
- - Takes into account the specifics of the application architecture
- - Sharing with WAF module allows to organize the process of secure software development and increase the level of security developed software
The Solution Designer allows the use of each module individually, in any combinations, as well as rapidly expand the range of use to the complete set
Customers Infowatch
Try a free 30-day access
Let us know, which are your company needs based in our technology. Or if you want a IW Attack Killer presentation, please mention it in the comment field.