On a continual basis we audit and conduct internal penetration testing on all of our infrastructure. Being a company that strives for continual innovation this process spawned some new technologies that we now utilize to protect our systems as well as our clients.
Commodity off the shelf firewalls typically only provide a couple of intrusion detection and prevention mechanisms. When reviewing these we found that they fell into either Firewall based or signature based. This approached lacked the insight and deep understanding of what was transpiring throughout our backend systems.
From this knowledge we created a third option. By leveraging the already setup centralized logging infrastructure that we use to monitor our applications we were able to build a system that not only analyzes network traffic but also has insight on how the backend systems are reacting. This gave us the ability to create a much more robust ecosystem of security. Through many enumerations and red-team-blue-team exercises we now have a set of continuously evolving rulesets that can be customized for the intricacies of any environment.
To learn more or utilize our security services please contact for more information.