Download Cobrador – Channeler brochure

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cryptanalysis wikipedia , lookup

Airport security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cross-site scripting wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Unix security wikipedia , lookup

Wireless security wikipedia , lookup

Deep packet inspection wikipedia , lookup

Security-focused operating system wikipedia , lookup

Hacker wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Distributed firewall wikipedia , lookup

Denial-of-service attack wikipedia , lookup

Mobile security wikipedia , lookup

Cyberwarfare wikipedia , lookup

Cyberterrorism wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Cyberattack wikipedia , lookup

Transcript
Cobrador’s Bouncer – Technological Overview
Bouncer™
Technological Overview
www.cobrador.net
Created by: Ofer Akerman
[email protected]
www.cobrador.net
1
Cobrador’s Bouncer – Technical Overview
Cobrador Bouncer™
Cyber terrorism and hacking attacks are not
impulsive
The
threat
of
attacks
on
operations.
Long
before
launching an attack, the offenders collect
corporate
technology infrastructures can no longer be
intelligence
overlooked. Security, in this day and age,
network. They utilize different sources
has surfaced as priority one amongst IT
spawning
managers. Company decision makers are
Afterwards, attackers construct intricate and
no
the
calculated offensive measures. Accurate
exposure of confidential and hypersensitive
information about applications, services,
inside-information.
network topology and other factors, are vital
longer
willing
to
compromise
concerning
from
your
different
corporate
locations.
components of a successful attack.
Corporate espionage can potentially bury
industry giants. Datamonitor estimates that
Existing security solution and architectures
the amount of money businesses lose each
are inherently flawed – they react only to
year due to security breaches is as much as
known attack patterns. As the number of
$15 billion.
threats to the integrity of any computer
network
grows
can
exponentially,
no
longer
existing
Cyber-terrorism and hacking intrusions are
architectures
provide
performed by well-organized and highly
adequate security against unrecognized
funded groups of professionals. These
events.
groups are persistent and equipped with
cutting edge technologies and computing
Cobrador’s Bouncer is the first product,
resources. Their mission is to incapacitate
which uses counterintelligence techniques
your systems’ functionality.
to identify and eliminate attacks at their
infancy stage – the planning stage. The
Cyber terrorists are constantly refining and
Bouncer will mask corporate fingerprints,
developing new attack methods in which to
thus, eliminating the offender’s ability to
sabotage your network operating center
gather valuable information about your
(NOC)
corporate network.
–
the
crux
of
vital corporate
information. Networking technologies are
perpetually evolving: only a live adaptive
defense
system
can
protect
your
corporation.
The conceptual question to be asked: Can
we trust security checkpoints exclusively to
preempt cyber attacks at the periphery layer
of our networks?
Created by: Ofer Akerman
[email protected]
www.cobrador.net
2
Cobrador’s Bouncer – Technical Overview
Cobrador Bouncer revolutionary technology
upgrade both the bouncer functionality and
is
early
versions. The appliance is easy to employ
symptoms of known and unknown attacks
and maintain. In addition, the Bouncer
before they reach the corporate periphery.
provides real time attack alerts.
designed
to
neutralize
the
This proprietary technology will add an
additional security layer to current security
products.
Cobrador
Bouncer
is a fully adaptive
security system. You can automatically
Configuration With Corporate Firewall
Created by: Ofer Akerman
[email protected]
www.cobrador.net
3
Cobrador’s Bouncer – Technical Overview
Cobrador Bouncer Defense Methods
of
access
control.
However,
sophisticated hackers utilize abnormal
are
packets to cause buffer overrun or DOS
adaptive in nature, and are based on
attacks, as well as TCP/IP stuck
proprietary bricks and policies definitions.
fingerprinting. Alternatively, the Bouncer
The Bouncer is an open security platform
checks the raw header in order to
and defense methods are dynamically
prevent abnormal packets from gaining
updated and improved using internal, as
access to the network.
The
Bouncer’s
defense
methods
well as third-party bricks developers.
Evasion defense
Reconnaissance countermeasure
In order to avoid intrusion detection,
Today, cyber attacks and industrial
hackers
intelligence go far beyond activation of
techniques.
scripts and pre-defined tools. A high
expected strings into several packets in
percentage of infamous cyber attacks
turn crossing the strings inspection.
and hacking intrusions are well-planned
These
operations, consisting of sophisticated
evolving.
intelligence gathering and meticulous
system
planning. This stage is not considered
techniques and is equipped with special
as a direct attack and therefore is not
bricks for anti-evasion and content
prevented
inspection.
by
existing
products.
use a variety of evasion
For
example,
techniques
The
are
splitting
constantly
Bouncer’s
evolves
adaptive
alongside
these
Cobrador Bouncer masks corporate
fingerprinting,
counteracts
Spoofing prevention
banner
grabbing, advance intrusive scanning
Spoofing is the preferred method of
and
staying
other
methods
of
intelligence
anonymous.
Sophisticated
hackers are commonly using these
gathering.
techniques to create different identities
Trojans communication prevention
in
The Bouncer provides a bidirectional
networks. The bouncer is equipped with
blocking of Trojans communication. In
anti-spoofing bricks that allows you to
addition to the regular port blocking
block
techniques
internal and external sources.
used
today
by
most
attempts
to
spoofed
access
packets
corporate
from
both
common firewalls products, Cobrador’s
Bouncer identifies covert channels and
Flooding prevention and bandwidth
Trojan
control
activations
commands
and
DOS attacks or inefficient use of
encompasses IDS abilities.
corporate bandwidth, are the most
Abnormal packets prevention
common factors of poor performance or
Firewalls generally inspect the header
denial
field of packets as a determining factor
equipped with special bricks that allow
Created by: Ofer Akerman
[email protected]
services.
The
Bouncer
is
www.cobrador.net
4
Cobrador’s Bouncer – Technical Overview
the security manager to define channels
malicious code. Anti virus products
and the designated ratio of traffic.
were designed to find a well-known
signature of viruses that are coming as
Malicious command injections
attachments. The most sophisticated
Malicious command injection is one of
email attacks are based on abnormal
the most dangerous attack techniques,
POP3 header combinations causing
regardless of the deployed security
arbitrary execution of commands. The
products. Hackers are able to inject
bouncer in turn validates the protocol
malicious
headers.
commands
through
the
application open channel (such as
HTTP, FTP and others). The majority of
User activity monitor and archiving
software is vulnerable to command
Suspicious
injection. The bouncer will prevent the
tracing systems are very important for
injected commands from reaching the
in-depth forensic of cyber crimes. The
application.
bouncer allow the corporate security
manager
level
exploits
to
activity
monitor
and
and
user
archive
suspicious activity at the “raw” level and
Exploits / Vulnerabilities handling
Content
user
to make the analysis offline.
and
vulnerabilities, requires installation of
several security systems. The bouncer
Redundancy features
is equipped with content level brick that
Enterprises with massive traffic can use
will allow you to perform bi-directional
redundancy policy.
content analysis, block sessions and
automatically switch the traffic from one
fake responds as part of the overall
Bouncer to another and vice versa.
This
policy will
counterintelligence techniques.
Email Buffer overrun/overflow attack
prevention.
Emails are the best vehicle to introduce
and distribute viruses, Trojans and
For more information about Cobrador and the Bouncer please visit us at
www.cobrador.net or contact us at [email protected]
Created by: Ofer Akerman
[email protected]
www.cobrador.net
5