Curtail Security Emerges
February 14, 2017
Using unique redundancy-based traffic
analysis to identify and isolate zero-day exploits and advanced
persistent threats (APT), Curtail keeps systems protected and running in
the face of attacks or equipment failure.
•Detects and isolates zero-day attacks: Curtail's ReCover provides a protective layer between attackers and application servers to detect and respond instantly to deviant application server behavior. ReCover monitors deep protocol interactions and compares application and session states to detect outliers in network behavior, disagreements in semantics or uncharacteristic communications in light of past traffic profiles. With ReCover, a compromised server can be isolated for analysis or shut down to disconnect an intruder while legitimate traffic is directed to redundant servers.
•Thwarts APTs and insider attacks: Using patented detection capabilities, Curtail's UnCover monitors backend servers for evidence of prior compromise, detects attacks as they happen and responds with actionable insight. Through statistical analysis of past traffic profiles, the software is able to detect mismatches in network behavior on specific ports, protocols or uncharacteristic communications and identify APTs, while protecting and diverting legitimate traffic to other redundant servers.
•Supports cloud, virtual and container environments: ReCover and UnCover are easily deployed on premises and scale in virtual machine, cloud and container environments. These solutions make building and migrating application stacks to container and virtual environments more secure and available in production when testing and phasing in new software.
•Designed by security experts:
Curtail was founded by security experts and the leaders of Recourse
Technologies (acquired by Symantec in 2002), the first company to
commercialize honeypots and to pioneer protocol anomaly detection/high
speed IDS, and one of the first companies to build a security management