Home

Continuous Security

Stay one step ahead of attacks

LEARN MORE

A Novel Approach to Security and Operations

Providing security and availability against inside and outside attacks, either in the cloud or on premises, Curtail Security™ saves enterprises money and increases productivity using novel redundancy-based traffic analysis to identify and isolate zero-day exploits, while continually serving legitimate traffic to other servers.

Combines Security and Availability

Organizations need to be able to find and stop hackers, whether from internal or external sources, without impacting operations. Using Curtail technology, attacks (including zero-days) are isolated to a contained resource while remaining traffic is diverted to a different server. In addition, Curtail can help verify the success of software upgrades before a full changeover has occurred.

Detects and Isolates Zero-day Attacks

Zero-day vulnerabilities often spring from new software or upgrades implemented to fix another vulnerability, creating unknown server-side risks. Through patented redundancy analysis detection, Curtail identifies both inside and outside attacks with fewer false positives. Curtail provides a protective layer between attackers and application servers to detect and respond instantly to deviant application server behavior.

Identifies Insider Attacks

Attackers may be present in the network and often go undetected for lengthy periods of time. Curtail’s patented solution UnCover™ is purpose-built to reveal signs of compromised machines and detect network traffic that hackers have used to gain access. Through statistical analysis of past traffic profiles and comparison across servers, Curtail is able to detect mismatches in network behavior and identify threats, while protecting and diverting legitimate traffic to other redundant servers.

Designed by security experts for security experts

Curtail Security provides uninterrupted security and enhanced operations.
CONTACT US

What makes us unique

DETECT

Identify both software flaws and compromised servers without interruption

ISOLATE

Convert production resources into a cage, protecting critical assets from attacks

OPERATE

Continue operations with traffic diverted to “redundant” servers while under attack