I come from the field of and I am interested in

Modern Network Security with Artificial Intelligence, Data Analytics and Anomaly Detection in the Network

In addition to the dangers of cyber attacks from the outside, networks are also increasingly threatened from within by advanced persistent threats and zero days. One solution is provided by intrusion prevention systems with threat intelligence that detect anomalies and attack patterns in the LAN and automatically intervene in the event of danger.

The innovative cognitix Threat Defender goes beyond intrusion prevention. With AI, data analytics and threat intelligence capabilities, it builds a second line of defense in the network to complement your firewall solutions that control and secure data traffic at the interfaces. Opt now for intelligent network security – from the inside and the outside.


Appliance

Virtualized product

Cloud

All Benefits of cognitix Threat Defender at a Glance

  • Full visibility of the entire network traffic and all devices
  • Full control of network traffic and behavior
  • Dynamic implementation of security guidelines: the behavior of devices/services/accounts determines the effective policies in the network
  • Tool for "Security Defined Networking" combines functions from various IT security platforms (NGFW, IDS, SIEM, ...)
  • Behavior-based, dynamic microsegmentation of physical networks up to application layer 7 in the device
  • Detection, analysis and behavior control in real-time for encapsulating attacks and dynamic network segmentation 
  • Intuitive and accessible monitoring with drilldown reporting
  • Digital sovereignty through development "Made in Germany"
  • Part of a comprehensive security solution concept from genua for enterprise IT and industrial OT
  • Fast sampling and inline platform for the use of data science, machine learning and AI for network and threat analysis

Dynamic Network Segmentation with Artificial Intelligence and Data Analytics

With artificial intelligence and data analytics, cognitix Threat Defender groups network participants into dynamic network objects according to their behavior. It reacts automatically to changed or undesired behavior and can deny conspicuous network participants access to certain resources if anomalies are detected – without manual intervention.

Real-Time Analysis and Management of Devices with Asset Tracking

IT security requires complete transparency. 

cognitix Threat Defender recognizes and manages all devices on the network using IP and MAC addresses. Specific metadata are added to the information obtained for this purpose. In this way, security guidelines can be created and applied for individual devices and their respective applications. This possibility also exists for device groups, for example for computers with Windows operating systems.

Comprehensive Monitoring with Drill Down Reporting

The interactive real-time reporting ranges from an overview of network traffic to individual user and application details. With over 600 interactive matrices and diagrams, you can quickly and effectively analyze your network from a variety of angles, including communication source and destination, IP addresses, applications and protocols.

Easy Integration and Attractive License Model

cognitix Threat Defender does not require any modifications to your existing routing infrastructure and can be easily and flexibly integrated into your network. It is available as a software solution with an attractive license model or with suitable hardware for the respective application. We will be happy to provide you with information about the system requirements for use on your existing hardware.

Support Direct from the Manufacturer

cognitix Threat Defender is constantly evolving to protect your organization from cyber threats in the best possible way.
We provide you with the latest product information and updates on a regular basis.

Our sales team will be glad to answer your questions. We are looking forward to get in touch with you.
 

CONTACT US