Providing security and availability against inside and outside attacks, either in the cloud or on premises, Curtail Security™ saves enterprises money and increases productivity using novel redundancy-based traffic analysis to identify and isolate zero-day exploits, while continually serving legitimate traffic to other servers.
Combines Security and Availability
Organizations need to be able to find and stop hackers, whether from internal or external sources, without impacting operations. Using Curtail technology, attacks (including zero-days) are isolated to a contained resource while remaining traffic automatically is directed to a different server. In addition, Curtail can help verify the success of software upgrades before a full changeover has occurred.
Curtail products are easily deployed at scale on premises and in the cloud in VM, container, and mixed environments, making the creation or migration of application stacks more secure.
Detects and Isolates Zero-day Attacks
Zero-day vulnerabilities often spring from new software or upgrades implemented to fix another vulnerability, creating unknown server-side risks. Through patented redundancy analysis detection, Curtail identifies both inside and outside attacks with fewer false positives. Curtail’s ReCover provides a protective layer between attackers and application servers to detect and respond instantly to deviant application server behavior.
Identifies Insider Attacks (APT)
Attackers may be present in the network and often go undetected for lengthy periods of time. Curtail’s patented solution UnCover™ is purpose-built to reveal signs of compromised machines and detect network traffic that hackers have used to gain access. Through statistical analysis of past traffic profiles and comparison across servers, the software is able to detect mismatches in network behavior on specific ports, protocols or uncharacteristic communications and identify advanced persistent threats (APT), while protecting and diverting legitimate traffic to other redundant servers.