Use cases
Use cases category
Phishing
Characteristic of phishing attacks that even though the victim uses many cyber defense tools the attack is still successful.
The attacker manages to infiltrate an attacker into the organization’s internal network, and from there the malware spreads and reaches the firewall, opening a backdoor for him to steal sensitive information, disrupt information, and then lock the network for extortion and bargaining.
According to an IBM study, it takes an average of 7 months for an organization to discover that he is under an attack of this kind. The attacker performs a covert activity, collects sensitive information, disrupts backups, and usually locks the system over a long weekend by encryption.
BNS being invisible, and thanks to advanced filtering capabilities in Layer 2 and its ability to selectively close and open access to firewall management, manages to close these vulnerabilities even in case the malware is already on the internal network and thus prevents this type of attack.
Insiders
We are witnessing a phenomenon where attackers reach out to people from within the organization and offer them to cooperate in exchange for payment.
By doing so, the attacker gains access to the most sensitive and confidential information.
Internal assistance allows an attacker to remotely access the internal network and remotely carry out cyber-attacks such as Ransomware, Espionage, Sabotage.
BNS has the ability to greatly strengthen the defense against such attacks that are characterized by abnormal behavior, since the attacker performs an act of harm under the guise of a legal and legitimate employee who performs a permissible and routine activity, while actually being the Bad guy.
The BNS uses already the upcoming WBC (White Box Cryptography) standard, which includes encryption keys without an external password, in fact, the BNS adds independent crypto codes in the network and therefore only the BNS can decrypt these passwords, unlike the existing practice where SSL VPN includes encryption keys that may leak to attackers especially if they are company employees. Besides the BNS is invisible in the LAN environment and disguises its filtering activity from attacks coming from inside (in addition to outside protection of course).
Espionage
BNS systems protect against espionage attacks by A utility developed by the company that marks sensitive files with a transparent watermark; Alerts and prevents anomalies in the use of bandwidth (Snowden effect); Filters sensitive content and Intellectual property, in the second tier; Prevents sensitive information from leaking out of the company; Network invisibility prevents attackers from bypassing BNS systems.
Ransomware
Recently we have witnessed a dramatic increase in the scope and variety of ransomware attacks. The victims are diverse including private individuals, SOHOs, organizations, and industrial enterprises. The damage that attackers cause beyond paying the ransom (in many countries it is illegal to pay a ransom) is also in exposing the personal details of the organization’s customers (an insurance company was recently blackmailed so that the attackers do not post pictures of personal plastic surgeries of its customers). BNS security products ensure a significant improvement in preventing ransomware attacks by preventing the spread of malware in the corporate network, preventing the leakage of sensitive information from the organization’s repositories by filtering in layer two, and by secretly protecting the organization’s resources by network BNS invisibility.