Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
Shortage of inhouse IT engineers
High costs of IT personnel
Values
Reduce Costs
Enhance Staff Productivity
Cleafy
Cleafy protects against Man-in-the-Browser (MITB), Man-in-the-Middle (MITM), Remote Access Tools (RAT) and Mobile Overlay and other sophisticated techniques used by today advanced attacks
About Product
Description
Cleafy innovative threat detection and protection technology is available in an open and flexible platform that can be easily adopted to address several needs for protecting your online services and users.
Features:
Cleafy protects on-line services against advanced, targeted attacks from compromised web/mobile endpoints thanks to its unique real-time, client-less threat detection and prediction capabilities. Cleafy has been successfully adopted to protect millions of users against Man-in-the-Browser (MITB), Man-in-the-Middle (MITM), RAT-in-the-Browser, VNC/BackConnect, Mobile Overlay, and other types of attacks.
Cleafy is fully client-less - it operates by integrating with server-side infrastructure: Cleafy provides out-of-the-box integrations with several Application Delivery Controller technologies. Cleafy does not require any application change and is completely transparent to end-users.
Cleafy provides (no-touch) visibility on endpoints that allows customers to identify potential threats and prevent business disruption from targeted advanced attacks, gain insights on attack scenarios and techniques (e.g. by inspecting code injected by malware) and thus define best response actions and their overall security posture.
Cleafy supports Online Fraud Prevention by providing real-time risk scoring and enabling selective risk-based authentication, thus preserving business continuity and user experience.
Key Differentiators:
Advanced threat detection and protection
- Patented Full Content Integrity (FCI) continuously verifies full application integrity (DOM/XHR/API)
- Deep threat visibility automatic extraction of threat evidence (e.g. malicious web-injects and mobile apps)
- Patented Dynamic Application Encryption (DAE) to enable safe transactions from infected endpoints
- Client-less - no agent deployed and passive mobile SDK – no touch of application backend infrastructure
- User-transparent – no impact on end-user experience, content delivery and endpoint performance
- Application-independent - no changes required to application code – no re-training upon new releases
- Open architecture and comprehensive REST APIs – integrates any Transaction Monitor, Case Mgmt, SIEM
- Scalable to continuously monitor full application perimeter and analyze millions of events/day
- Deployed either on-premise or over the Cloud