RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Cezurity СОТА Cloud Observer for Targeted Attacks

Product
The name of the base system (platform): Cezurity Sensa
Developers: Cezurity
Last Release Date: 2017/04/20
Technology: SaaS - The software as service,  cybersecurity - Antiviruses

The solution Cezurity COTA is based that actions of malefactors inevitably lead to change of the attacked systems. Cezurity COTA reveals the APT attacks using monitoring of statuses of endpoints. It allows to detect any attempt attacking to be fixed in an information system of the company. State-of-health data of computers in different timepoints are compared among themselves. The happened changes are analyzed by cloud expert system of Cezurity Sensa and if they have signs of anomalies, then it is a danger signal. Such approach allows to reveal those attacks which did not meet earlier

2017: Cezurity Cota SoHo Edition

On April 20, 2017 the Cezurity company announced release of Cezurity COTA SoHo Edition - technology for identification of the hacker attacks in the small companies. The product Cezurity is intended for the companies less than 50 employees.

According to developers, the organizations of such size are deprived of an opportunity to use any solutions for protection of the network, except standard tools – an antivirus or a firewall. Such provision is caused by the high cost of specialized solutions and the fact that the small companies are not able to afford an opportunity - to have in staff of the qualified, expensive specialists in information security field, to resort to outsourcing services.

Screenshot of the software window, (2016)
File:Aquote1.png
The head of the small company does not know that normal mouse click according to the letter in e-mail sometimes threatens all business, he closes a door in the office in the evening, but does not think that computers are defenseless, and from them the beginning hacker can steal all information, having spent for the organization of the attack several hours. Till today small business had no tool capable to answer a question of whether there are in the computer network uninvited guests. We want to offer such tool.

Andrey Voronov, technical director of Cezurity
File:Aquote2.png

At the heart of Cezurity COTA SoHo Edition the technology of monitoring of computers and servers works, revealing anomalies in work. The low cost of ownership which makes the solution available to the small companies is caused by a cloud computing architecture: data processing happens in the cloud Cezurity Sensa system.

The analytical Cezurity Sensa system is developed and is supported by Cezurity company, is placed in data center of Selectel.

The feature of Cezurity COTA is that for identification of the attacks "black lists" are not used:

  • determinations of viruses (anti-virus signatures),
  • signatures of behavior of malware,
  • compromise indicators (Indicator of compromise, IOC).

The technology does not look for coincidence to base of programs, or events who are already known that they bear harm. At the heart of the solution – identification of anomalies or aberrations. For this purpose state-of-health data of computers in different timepoints are compared among themselves. The happened changes are analyzed by the cloud Cezurity Sensa system and if they have signs of anomalies, then it becomes a danger signal. This approach allows to reveal the attacks which did not meet earlier – for example if hackers were interested in the specific company and they adapted means of the attack that the antivirus could not detect them.

File:Aquote1.png
We expect to interest very wide range of the companies from the different industries, any company realizing risks which are connected with a compromise of data can become our buyer. For example, lawyer bureau, consulting company, auditing or accounting company, any outsourcer. Sometimes such companies become a target of hackers only for the reason that work with large business, and their infrastructure – the comfortable base for the organization of the attack on the partner. If the average or big organizations can estimate the risks from a compromise of data in money, then for the small companies risk, as a rule, only one. It is business loss.

Dmitry Popovic, marketing director of Cezurity
File:Aquote2.png

File:Aquote1.png
The world of computer threats changed, the organization of the hacker attacks purchased lines of the underground industry with job specialization. Job specialization led to the fact that tools and for deception of protection of steel are available to the organization of the attacks even to the beginning hackers – in the form of products or in the form of services. If the antivirus is silent, then it does not mean that in network there are no uninvited guests.
File:Aquote2.png

Cezurity COTA SoHo Edition is available to the order at official partners of Cezurity since April 21, 2017.

2015: Cezurity Cota

Solution for detection of the purposeful attacks (APT) of Cezurity Cota. It is intended for corporate customers. In Russia and the CIS exclusively is on sale Infowatch company – they deliver this solution under the trademarks (Infowatch TAD and Infowatch Attack Killer). Key advantage is that in comparison with competing our solution it is simpler to implement also lower than the cost of ownership.