TLS (Transport Layer Security) 🟢 Protection

TLS (Transport Layer Security) is a cryptographic protocol designed to secure communications on the Internet.

It establishes a secure channel between a web server and a client (a browser, for example), guaranteeing the confidentiality and integrity of the data exchanged. TLS is the successor to the SSL (Secure Sockets Layer) protocol.

Token 🟢 Protection

In cybersecurity, a token is a form of digital token used to authenticate, authorise or secure communications between users, applications or systems. It is often used to avoid directly manipulating sensitive information such as passwords.

UDP flood 🔴 Attack

A UDP flood attack is a type of Denial of Service (DoS) attack which involves flooding a target (server, network, etc.) with a large number of UDP (User Datagram Protocol) packets. The aim is to overwhelm the target,...

UEBA 🟢 Protection

User and Entity Behavior Analytics (UEBA) is an advanced category of cybersecurity solutions that uses artificial intelligence and machine learning to detect anomalous and potentially malicious behavior by users and entities within a computer network.

In simple terms, the UEBA does not simply look for signatures of known attacks (as traditional antivirus software does) or check predefined rules (as firewalls do). The UEBA learns what is 'normal' for each user and each entity (machines, applications, servers, etc.) and alerts you as soon as any behaviour deviates from this norm.