With the latest attacks now hitting manufacturing (KP), it is now time to start talking about how we can protect infrastructure through real-time packet analysis.   By detecting anomalies with real-time packet analysis, we can detect malware, phishing and ransomware attacks before it lands in any storage or data at rest device or facility.

ETL  Peering exchange allows organisations to analyse every packet with line-rate speed without data replication. In contrast, traditional AI security tools typically sample around five percent of network traffic data, leading to threat-detection algorithms based on incomplete models.

Peering Exchange applies real-time telemetry, policy enforcement and processing at the edge coupled with AI to analyse more security data without sacrificing cost or performance.

We kill threats at ingest whilst analysing east-west traffic to protect infrastructure from further insider threats and vulnerabilities. Saving petabytes on capacity from rogue elements as well as protecting cyber engineering time.


 “Secure Your Corporate DNA”

Our Ingest Security ensures access is only granted to permitted Devices, Networks, Apps and Users.

Incidents, resulting in financial loss, corporate, industrial espionage or the endangerment of lives are increasingly becoming regular news.

Ransomware report on small- and medium-sized businesses.
original source Malwarebytes

We are in a new world war: a global economy of sophisticated cross border cyber-attacks that, ironically, is assisted by human error and vulnerable systems within the targets. Global supply chains in particular create unprecedented opportunity for hackers to cause mayhem and panic among corporates and stakeholders.

“Automating Security and Corporate Risk Policies While Isolating the Enterprise to Outsiders”

Today  7-figure fines, corporate bankruptcy,  shareholder losses, counts of corporate manslaughter and multi-million in environmental clean-ups, are part of the corporate risk and that’s before we take into account the world of Industrial control systems vulnerabilities, embedded device networks, hacking and blackmail.

Our automated device level policy driven security system would assure that the risk would be significantly lower and unlikely to happen due to cyber engineering and regulatory affairs having the right tools to control identified risks?  Corporates and supply chains must know which applications and systems are approved to work together and which devices across automated networks are part of, or can connect to, the supply chain system in real-time.

An example solution  includes:

  1. Video monitoring across our extensive high bandwidth secure network gateway;
  2. Embedded control management systems.
  3. Auditing of vehicle/device activity according to schedules and policies.
  4. Activating any fail-safe mechanisms should system monitoring show irregularities.
  5. killing malware, phishing, ransomware at the ingest and east west traffic monitoring.

How we do it:

  1. We create a supply chain DNA system fingerprint, whether it be at the user, application or physical levels (or in combination),
  2. Enables systems control to be effectively monitored and managed while excluding hackers and isolating the corporate network from the public internet.
  3. Only DNA enabled devices/apps can participate in the closed system.

Location level auditing: all locations would be recorded in real-time and automatically audited as part of the regulatory framework.  The resulting dashboard and Management Information would form part of the DNA for automated decision making and human decision support. The solution can be applied to all Industrial Systems Controls to tighten regulatory frameworks and provide assurance on lowering risk as each gap is identified and eliminated.

Lastly we are backed by Nvidia and have the ability to scale our solution globally, We look forward to your call.

Please find an example of how we automate mobile phone threats and stop non corporate approved applications from running inside the approved network.