• Home
  • Products
    • Anti-Malware
      • Cezurity
        • Cezurity Technologies
      • Kaspersky
        • Anti Targeted Attacks
        • Anti Ransomware Tool – Contact Us
        • Noransom
    • DDoS Protection
      • InfoWatch Anti-DDoS
      • Kaspersky DDoS Protection
    • Infowatch Attack Killer
  • Services
    • AntiMalware Service
    • G Suite
    • Inbound Marketing
      • Marketing Clients
    • IPification
    • Malware Removal
  • Store
  • Support
  • Partners
  • About Us
  • Home
  • Products
    • Anti-Malware
      • Cezurity
        • Cezurity Technologies
      • Kaspersky
        • Anti Targeted Attacks
        • Anti Ransomware Tool – Contact Us
        • Noransom
    • DDoS Protection
      • InfoWatch Anti-DDoS
      • Kaspersky DDoS Protection
    • Infowatch Attack Killer
  • Services
    • AntiMalware Service
    • G Suite
    • Inbound Marketing
      • Marketing Clients
    • IPification
    • Malware Removal
  • Store
  • Support
  • Partners
  • About Us

Cezurity Technologies

Cezurity has always focused on creating innovative technologies that protect computers and user information.

There was a time when the anti-virus industry needed to protect users from only one main type of threat: viruses. In the 1990s, anti-virus software needed only to defend against a few dozen known viruses. Security software always had “anti-virus” in the name, leaving no confusion about the features or threat the software was meant to address. Although viruses were able to harm a computer or a victim’s data, their creators rarely were able to make money from the mayhem caused.

The threat landscape changed, however. Today’s virus creators are in it not to have fun or to make a point, but to cash in. Cybercrime is the domain of professionals, who are crafting targeted attacks and creating more threats than ever before. Anti-virus protection can be neutralized or circumvented in any number of ways.

The breaking point for the anti-virus industry came in 2005 and 2006, when the amount of malicious software grew exponentially even as it became more and more complicated. In 2005, the virus database of AV-Test.org, a research laboratory that tests anti-virus software, held fewer than three million samples of malware. In 2010, this number jumped to over 40 million, and in 2012, this number exploded again to over 100 million. Traditional anti-virus solutions had fallen behind, unable to keep up with the growth in malware and vulnerable to malicious deactivation. Low-level attacks were too much to handle for the protection available at the time.

This spurred the developers of existing products to look for new solutions to keep users safe. Different companies took different paths, based on new technologies that reflected each company’s understanding of the cyberthreat landscape.

Key technologies in Cezurity solutions:

Our engine for detecting malicious activity on user computers.
 

Centralized detection engine

Malware and attacks are detected from a central mechanism, which acts as a hub for collecting information about different events. This information is received in real time from key subsystems, such as signature and heuristic anti-virus detection, firewall, application control, and the Cezurity Cloud platform for intelligently analyzing file properties.
 

Event chains

Event Observer looks at chains of events, not just individual events. For each chain of events, Cezurity EvO calculates a behavior vector that allows making a verdict regarding the danger level.
 

Context

Events are analyzed in the context of other events. Perhaps a certain event by itself is not suspicious. But when seen together with other events, it is clear that the event may cause harm to the computer.
 

Real-time analysis

The verdict can be affected by each new event. Event analysis occurs not sequentially within separate subsystems – as most Internet Security-type solutions do – but in parallel. So threats are detected in real time, not after something dangerous has already happened. This substantially reduces the risk that your computer will be infected: it’s easier to prevent an infection than to treat an infected computer.
 

Why Cezurity EvО is better than other detection methods:

  • Minimal performance hit.
  • More precise detection and more reliable protection. Fewer false positives: in most solutions, reducing false positives requires reducing the protection level (more aggressive protection causes more false positives).
  • Real-time protection reduces the risk of system infection.
  • The software works autonomously, requiring less intervention and decision-making by the user.
  • Protection from currently unknown (zero-day) malware and attacks.
  • Protection from rootkits.
  • Self-defense prevents attackers from disabling anti-virus protection.
  • New: protection from advanced persistent threats.
  • New: monitoring of applications and full implementation of default deny capabilities (“forbid everything that is not allowed”).
  • New: ultrasafe apps. This feature, a new one for anti-virus solutions, allows protecting the data inside applications and user folders.
Cezurity Cloud
  • Cloud-based technology for detecting malware.
     

    In-the-cloud analysis of file properties

    User computers collect a large amount of information about file properties and send it to the cloud. On our server, the data is classified and stored in a special database. Cezurity Cloud analyzes over 200 properties for each file, including the countries in which the file is most popular, where the files are found in the system, and how the files behave when run.
     

    Self-learning

    As information is processed and the danger of different objects is evaluated, new classifications are generated automatically – which makes Cezurity Cloud a self-learning system that is constantly getting smarter. And if there is not enough information to be sure about the danger of an object, it asks for additional information.
     

    Smart analysis of Big Data

    Cezurity Cloud uses special techniques for processing Big Data to ensure the best possible anti-virus analysis.
     

    Why it’s better:

    • Precise detection
      Cezurity Cloud is an effective solution for some of the most vexing problems facing the anti-virus industry today. First and foremost, this means detecting malware with greater precision, even as malware becomes more complex and more numerous.
    • A new approach to cloud-based anti-virus protection
      Cezurity Cloud examines more object properties than do other cloud-based solutions. This opens up opportunities for use cases that go beyond reputation-based file detection or whitelisting.
    • Flexibility
      Cezurity Cloud has the flexibility to fit into diverse solutions. Different information can be sent and processed by the server, depending on the needs of each product or solution. For example, Cezurity Cloud is currently used as a subsystem to supply data for the Cezurity EvO detection engine. Cezurity Cloud helps the Anti-Virus Scanner to detect malware. In addition, the technology is used for monitoring and analyzing changes in our APT-D solution designed to detect persistent threats against corporate networks.
    • Dynamic Threat Detection
      Protection of corporate IT infrastructure from advanced persistent threats (APT) is the mission of Dynamic Threat Detection by Cezurity. Featured in our APT-D (Advanced Persistent Threat Detection) solution, this technology monitors systems for changes and analyzes changes that are anomalous.
       

      Monitoring of system changes

      Critical areas of memory on each of the computers in your protected IT infrastructure are periodically scanned. The scanning process collects and classifies many types of data about the state of the system. This data is compared to the results of previous scans.
       

      Search and analysis of anomalous changes

      The first step of analysis identifies anomalous changes that have taken place since the previous scan. While anomalies can take place for any number of reasons, any attack attempt will cause anomalies. So during the second step, Dynamic Threat Detection analyzes the anomalies found, determines the cause for them, and classifies any attacks accordingly.
       

      Cezurity Cloud technology

      Cezurity Cloud monitors for changes, acting as a smart self-learning system that looks at file properties and application behavior.
       

      Benefits and features:

      • Different “calling cards” of advanced persistent threats are taken into account: duration, step-by-step execution, and necessity for the attacker to evade protection mechanisms.
        Attackers take steps to avoid getting detected. So any particular aspect of the system might not look suspicious. But looking at the changes can allow spotting the attack all the same: if the IT infrastructure is attacked, this will eventually cause an abnormal change in at least one system, alerting you to what is happening.
      • One solution for detecting all types of attacks.
        Other solutions are often piecemeal: they might be good at one type of attack but prove useless for another type. Perhaps it can spot anomalous network traffic – but it can’t correlate this event with the appearance of new files in critical areas of the operating system. Using several solutions for protection at the same time can be a hassle for administrators, which impairs the overall level of protection.
      • Quick detection.
        Dynamic detection allows you to detect attacks right away – immediately after a critical malicious change has been found in a protected system.
      • Easy to deploy and get started with.
        Dynamic detection is based on endpoint monitoring, so it is independent of your company’s infrastructure and network topology. Our solution is easy to deploy and get started with even if your IT infrastructure is complicated and contains diverse system types.
      • Low performance overhead.
        The most resource-intensive analysis is handled by our cloud platform (Cezurity Cloud) – the CPU hit on your company’s computers is minimal.
      • Closed Secure Environment
        Closed Secure Environment can protect critical infrastructure, including such SCADA and embedded systems as ATMs, payment terminals, and more.
         

        System events monitoring by hooking system calls

        Our Closed Secure Environment technology controls the events that take place in the system, thanks to low-level interception of system calls. Low-level control (as close to the metal as you can get) of network interaction is combined with bilevel cross-checking.
         

        Security policies for each action

        Each action is subject to a rule or set of rules, called a security policy. This allows you to whitelist actions on critical systems – forbidding everything that is not explicitly allowed – which is considered best practice.
         

        Restricted actions

        The behavior of applications and the OS inside the closed secure environment is tightly controlled. Each application can perform only the actions that are allowed for it.
         

        Access control

        All system and critical processes are protected from interference by other software. Each process can be affected only in an allowed way. For example, malware cannot infect a trusted application that has broad system rights in order to perform actions under that application’s cover.
         

        Benefits and features:

        • Ultra-high reliability
          Closed secure environments are one of the most foolproof ways to ensure the safety of SCADA systems and critical infrastructure. Our technology completely isolates the processes running on the computer from the effects of any other software.
        • Monitoring of all critical events
          Our technology allows implementing a “white list” of actions, which forbids all actions that are not explicitly allowed. Any forbidden actions can be blocked automatically or remotely, via centralized system management. Application actions in the system are monitored and supervised, such as hidden creation of files, hidden program launch, interaction with other processes (injection of malicious code), network access, etc.
          Cezurity Closed Secure Environment technology prevents even processes that the OS can’t see from sending or receiving data. Even zero-day rootkits with their own kernel-level TCP/IP stacks can’t get through! Our technology also allows using patterns found in logs of application interactions to detect attacks.
        • Flexibility
          Cezurity solutions can be configured for client-specific needs. For example, the number of events that are analyzed can be increased. Data analysis logic and decision-making can be set individually for each type of event, depending on whether you want to forbid, allow, or log the action.

Social Media

ProtagonUSA Feed

Subscribe in a Reader

Menu

  • Home
  • Products
  • Services
    • IPification
  • Store
  • Posts
  • Support
  • Partners
  • About Us
  • Privacy Policy

© Cybersecurity - Business Consulting - Protagon USA 2025. All Rights Reserved. Developed by ProtagonUSA™ Design Team

Contact us!