* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Cobrador – Channeler brochure
Survey
Document related concepts
Cryptanalysis wikipedia , lookup
Airport security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Cross-site scripting wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Unix security wikipedia , lookup
Wireless security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Security-focused operating system wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Distributed firewall wikipedia , lookup
Denial-of-service attack wikipedia , lookup
Mobile security wikipedia , lookup
Cyberwarfare wikipedia , lookup
Cyberterrorism wikipedia , lookup
Computer security wikipedia , lookup
Transcript
Cobrador’s Bouncer – Technological Overview Bouncer™ Technological Overview www.cobrador.net Created by: Ofer Akerman [email protected] www.cobrador.net 1 Cobrador’s Bouncer – Technical Overview Cobrador Bouncer™ Cyber terrorism and hacking attacks are not impulsive The threat of attacks on operations. Long before launching an attack, the offenders collect corporate technology infrastructures can no longer be intelligence overlooked. Security, in this day and age, network. They utilize different sources has surfaced as priority one amongst IT spawning managers. Company decision makers are Afterwards, attackers construct intricate and no the calculated offensive measures. Accurate exposure of confidential and hypersensitive information about applications, services, inside-information. network topology and other factors, are vital longer willing to compromise concerning from your different corporate locations. components of a successful attack. Corporate espionage can potentially bury industry giants. Datamonitor estimates that Existing security solution and architectures the amount of money businesses lose each are inherently flawed – they react only to year due to security breaches is as much as known attack patterns. As the number of $15 billion. threats to the integrity of any computer network grows can exponentially, no longer existing Cyber-terrorism and hacking intrusions are architectures provide performed by well-organized and highly adequate security against unrecognized funded groups of professionals. These events. groups are persistent and equipped with cutting edge technologies and computing Cobrador’s Bouncer is the first product, resources. Their mission is to incapacitate which uses counterintelligence techniques your systems’ functionality. to identify and eliminate attacks at their infancy stage – the planning stage. The Cyber terrorists are constantly refining and Bouncer will mask corporate fingerprints, developing new attack methods in which to thus, eliminating the offender’s ability to sabotage your network operating center gather valuable information about your (NOC) corporate network. – the crux of vital corporate information. Networking technologies are perpetually evolving: only a live adaptive defense system can protect your corporation. The conceptual question to be asked: Can we trust security checkpoints exclusively to preempt cyber attacks at the periphery layer of our networks? Created by: Ofer Akerman [email protected] www.cobrador.net 2 Cobrador’s Bouncer – Technical Overview Cobrador Bouncer revolutionary technology upgrade both the bouncer functionality and is early versions. The appliance is easy to employ symptoms of known and unknown attacks and maintain. In addition, the Bouncer before they reach the corporate periphery. provides real time attack alerts. designed to neutralize the This proprietary technology will add an additional security layer to current security products. Cobrador Bouncer is a fully adaptive security system. You can automatically Configuration With Corporate Firewall Created by: Ofer Akerman [email protected] www.cobrador.net 3 Cobrador’s Bouncer – Technical Overview Cobrador Bouncer Defense Methods of access control. However, sophisticated hackers utilize abnormal are packets to cause buffer overrun or DOS adaptive in nature, and are based on attacks, as well as TCP/IP stuck proprietary bricks and policies definitions. fingerprinting. Alternatively, the Bouncer The Bouncer is an open security platform checks the raw header in order to and defense methods are dynamically prevent abnormal packets from gaining updated and improved using internal, as access to the network. The Bouncer’s defense methods well as third-party bricks developers. Evasion defense Reconnaissance countermeasure In order to avoid intrusion detection, Today, cyber attacks and industrial hackers intelligence go far beyond activation of techniques. scripts and pre-defined tools. A high expected strings into several packets in percentage of infamous cyber attacks turn crossing the strings inspection. and hacking intrusions are well-planned These operations, consisting of sophisticated evolving. intelligence gathering and meticulous system planning. This stage is not considered techniques and is equipped with special as a direct attack and therefore is not bricks for anti-evasion and content prevented inspection. by existing products. use a variety of evasion For example, techniques The are splitting constantly Bouncer’s evolves adaptive alongside these Cobrador Bouncer masks corporate fingerprinting, counteracts Spoofing prevention banner grabbing, advance intrusive scanning Spoofing is the preferred method of and staying other methods of intelligence anonymous. Sophisticated hackers are commonly using these gathering. techniques to create different identities Trojans communication prevention in The Bouncer provides a bidirectional networks. The bouncer is equipped with blocking of Trojans communication. In anti-spoofing bricks that allows you to addition to the regular port blocking block techniques internal and external sources. used today by most attempts to spoofed access packets corporate from both common firewalls products, Cobrador’s Bouncer identifies covert channels and Flooding prevention and bandwidth Trojan control activations commands and DOS attacks or inefficient use of encompasses IDS abilities. corporate bandwidth, are the most Abnormal packets prevention common factors of poor performance or Firewalls generally inspect the header denial field of packets as a determining factor equipped with special bricks that allow Created by: Ofer Akerman [email protected] services. The Bouncer is www.cobrador.net 4 Cobrador’s Bouncer – Technical Overview the security manager to define channels malicious code. Anti virus products and the designated ratio of traffic. were designed to find a well-known signature of viruses that are coming as Malicious command injections attachments. The most sophisticated Malicious command injection is one of email attacks are based on abnormal the most dangerous attack techniques, POP3 header combinations causing regardless of the deployed security arbitrary execution of commands. The products. Hackers are able to inject bouncer in turn validates the protocol malicious headers. commands through the application open channel (such as HTTP, FTP and others). The majority of User activity monitor and archiving software is vulnerable to command Suspicious injection. The bouncer will prevent the tracing systems are very important for injected commands from reaching the in-depth forensic of cyber crimes. The application. bouncer allow the corporate security manager level exploits to activity monitor and and user archive suspicious activity at the “raw” level and Exploits / Vulnerabilities handling Content user to make the analysis offline. and vulnerabilities, requires installation of several security systems. The bouncer Redundancy features is equipped with content level brick that Enterprises with massive traffic can use will allow you to perform bi-directional redundancy policy. content analysis, block sessions and automatically switch the traffic from one fake responds as part of the overall Bouncer to another and vice versa. This policy will counterintelligence techniques. Email Buffer overrun/overflow attack prevention. Emails are the best vehicle to introduce and distribute viruses, Trojans and For more information about Cobrador and the Bouncer please visit us at www.cobrador.net or contact us at [email protected] Created by: Ofer Akerman [email protected] www.cobrador.net 5