Developers: | Cybertinel |
Technology: | Cybersecurity - Antiviruses, the Firewall, cybersecurity - Information loss preventions, cybersecurity - Means of enciphering |
The purposeful attacks and zero day attacks when malefactors use vulnerability yet not known to the software maker for penetration into a system remain the most dangerous threats in the field of information security for the state and corporate sectors. The Cybertinel command having more than 40 years' experience in researches of a malicious code, testings for penetration, "white" hacking and development of own products in information security field specializes in protection against similar threats. So, the platform for protection of Cybertinel Endpoint Security Platform (CESP) workstations is actively used in the government and public institutions of Israel, including in the Ministry of Foreign Affairs and national security and also industrial and financial institutions, research laboratories and on objects of critical infrastructure in Germany, Austria, Switzerland, Poland and Spain.
The CESP platform uses not signature method that allows to detect automatically difficult cyber attacks, on a centralized basis to collect data on executable files of applications, to reveal threats and to make internal investigation of incidents on the basis of static, dynamic, mathematical, behavioural analysis of the code. The analytical system module collects and compares different files, detects similar components of the code, making, thus, a cyber attack profile, and allowing to assess potential damages from the attack.
The mode of online monitoring of a system of CESP provides timely detection of a source of the attack, providing the complete information about strategy and a method of its implementation, history and creators and other data that gives the chance to neutralize threat before emergence of undesirable effects. Important advantage of the solution – information processing on the central server without connection to external resources that excludes risk of leakage of confidential data. Besides, a system carries out scanning of files on a dedicated server based on from 8 to 30 anti-virus "engines".