This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use,
see our Privacy Policy.
Al Is Here. Are You Ready? Explore Tips on Your Device Refresh Strategy
- In Stock
- Virtual delivery
Add to Cart
Messages
Loading
-
:
Quick View
Getting Details
The Mykonos Web Security is the first Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time. Traditional web application firewalls are seriously flawed because their reliance on a library of signatures to detect attacks and makes them susceptible to unknown (zero day) web attacks.
Mykonos Software technology uses Intrusion Deception to address this problem. Unlike signature-based approaches Mykonos Web Security inserts random, variable detection points, or tar traps, into the code of outbound Web application traffic to proactively identify attackers before they can do damage - without false positives.
Mykonos Web Security inserts detection points into web application code including urls, forms and server files to create a variable minefield. These traps detect hackers when they manipulate the detection points during the reconnaissance phase of the attack, before they can establish an attack vector. And because hackers are manipulating code that has nothing to do with the website or web application, the malicious action is certain.
Mykonos captures an attacker's IP address as one data point for tracking. But many legitimate users could also be accessing the site from the same IP address - for this reason, Mykonos Web Security goes beyond the IP address and tracks attackers more granularly. Attackers using a browser are tracked by injecting a persistent token into their client. Attackers using scripts and tools are tracked using a fingerprinting technique to identify the machine delivering the script.
Mykonos Software technology uses Intrusion Deception to address this problem. Unlike signature-based approaches Mykonos Web Security inserts random, variable detection points, or tar traps, into the code of outbound Web application traffic to proactively identify attackers before they can do damage - without false positives.
Mykonos Web Security inserts detection points into web application code including urls, forms and server files to create a variable minefield. These traps detect hackers when they manipulate the detection points during the reconnaissance phase of the attack, before they can establish an attack vector. And because hackers are manipulating code that has nothing to do with the website or web application, the malicious action is certain.
Mykonos captures an attacker's IP address as one data point for tracking. But many legitimate users could also be accessing the site from the same IP address - for this reason, Mykonos Web Security goes beyond the IP address and tracks attackers more granularly. Attackers using a browser are tracked by injecting a persistent token into their client. Attackers using scripts and tools are tracked using a fingerprinting technique to identify the machine delivering the script.
-
Software Subcategory: Online & appliance based servicesWarranty Period: New releases update
-
Due to manufacturer restrictions, all sales on this item are final.
-
0 lbs
-
43222501
Batch Add Products by Item #
09