
AEGIS is also supplying to NATO`S designated vendor.
We started supplying NATO`S designated vendor after the tremendous electric failure in Turkey on March 31th 2015,
provoked by a massive cyber-attack over the country.
As Aegis is a cloud based security system.
You do not need to worry about buying a new hardware, setting up a program, operate a new system or renewing it.
-

Supplier for NATO`S designated vendor. Our performance proves that we are at the front edge of cyber war.
-

Don't worry about any extra work or cost, cloud service saves them all.
-

All attacks targeted to all our clients are automatically going to be shared. The cloud system learns and evolves every day.
Attack log is created when a user makes a cyber attack.
*cyber attack usually occurs several times.
Logs are send in real time in encrypted code
The main system checks if the log is an attack or not.
*the log data is deleted after 5days
If detected as a malicious access,
the main system will give order to
the agent program to ban the access.
IP address and signature pattern of malicious access will be add on the IP table (black list) and will forever be excluded.
The agent will continue to stop the same malicious IP or the same signature pattern attack.
Information of a new malicious IP or
new signature pattern are going to be add on
the IP table and block rule. It means that the
information, on the other hand the
knowledge is share to all our
clients Aegis IPS/WAF continues to
evolve every second.
-
- ①Access
- When it is accessed by the user / cyber attacker, and create a log. * Information leakage usually do not occur in a single attack.
-
- ②Sending logs
- Send the log information in real time (by encrypted communication).
-
- ③Checking logs
- Make one of judgment and judgment is an attack.
-
- ④Block order
- And then notifies the agent blocking instructions to immediately if it was malicious access.
-
- ⑤A new attacker will automatically be add on the IP table
- Add the IP address that managed a cyber attack on the IP table, also it prevents future attacks.
-
- ⑥Blocking the attack
- Attack from the attacker’s IP address, we will continue the defense by attack signature pattern analysis.
-
- ⑦Sharing the IP of attacker
- Attack from the new IP address, the new signature pattern attack, we will share immediately to contract the user all of the blocking rules.It is a system that continues to evolve.
