Protection

A Virtual Private Network or VPN is an encrypted tunnel to allow secure communications and is used to extend a private network over a public network.

We can set up a Virtual Private Network from each of our network Points of Presence (PoPs) to help keep your data safe!

There are 2 types of VPNs:

  • IPSEC VPNor IPSEC encrypted GRE Tunnels: Connectivity for Datacentres
    Cloud Platforms to Devices

  • Client Access VPN,: Temporary, secure access to

    Devices

More info in the VPN section

Signature-based, heuristics and anomaly-based, we identify and flag threats as they occur on the network in real time!​

An agentless IoT security monitoring product, capable of monitoring billions of devices and their data transmissions. Uses a three-tier detection strategy: signature-based, heuristics and anomaly-based, it identifies and flags threats as they occur on the network.

The threat database is updated in real-time with signatures gathered from 48 honeypots located in key cities around the world. We alert you to anything suspicious as it learns which traffic is normal for your device and it´s compatible with even the simplest of IoT devices and can be applied to any existing system with no extra effort.

Advantages: 

  • Multi-tier detection strategy: signature-based, heuristics and anomaly-based

  • Machine learning algorithm compares its findings with real-time global threat updates to improve detection.

  • Zero latency

  • No compute power, applications, or integration required from you.