"Block countries where I have no employees or customers"
With the business version of the Intrusion Detection and Protection System (IDPS), you can protect up to 10 devices from external and internal threats without needing a specialized IT department.
IDPS Business allows you to protect against tactics and techniques used by cybercriminals based on actual and current attacks. We constantly observe and generate defensive rules based on probes on our honey pot servers, workstations, mobile devices, emails, IoT devices, programmable logic controllers, routers, switches and firewalls, so you do not have to.
We do not replace your current protection; we add the features current implementations are missing.
Having the ability to understand your dilemmas sets us apart from the competition as our solutions don't force you to replace anything you already own. Whether you already use Microsoft Defender or 3rd party tools like Malwarebytes, we will co-exist and combine the features so that you can take full advantage of any protection you already have.
When it comes to sharing threat detection, utilizing swarm intelligence; isolating devices that are actively fighting malware detection; and removing network connectivity from those devices that are actively displaying malicious behaviour can mean the difference between going bankrupt or having a user complain to IT that something is hampering his work.Is there a scenario you would prefer to see unfold, a call to IT or a call to law enforcement ?
Antivirus doesn't work as you think; an antivirus can only react to know Malware. It works by checking your files against a list of known viruses and comparing the two. If a virus is new and unknown, there is nothing to compare it to, and you will get infected.
The built-in firewalls with the default settings leave a computer wide open to any outgoing communication, even to know malware control servers. Making things worse, managing a few 1000 rules daily to address the latest compromised servers is just not doable.
No feature or method on a windows PC or server will trigger a warning if a probe is detected, let alone prevent the malicious actor from successfully using an exploitable vulnerability. We have that feature. We block them before they succeed.
Windows doesn't have a feature that enables users to control or block access to a domain from applications easily. As a result, the applications are able to turn you into a product that can be marketed and sold to third parties. We make transparent which applications are communicating and allow you to block or filter this with a simple mouse click.
Frequently asked questions
Simple to answer really, consider the following 8 points
- Have you been handing out your WiFi password to some one, especially some one you no longer have a relationship with?
- Have you shared an account like streaming service like Netflix, Disney, Amazon?
- Could some one that was at your house have gained access to your smart devices?
- Did some one use your phone, lets say to order food?
- Did you dispose of old electronics like a printer, a phone, or any wireless-enabled wearable technology like a watch or Fitbit?
- You're internet service provider gave you some router, or your router is cheep, or more than a year old?
If any of the above is a ''yes'' then first, before you continue reading do this, in this order
- change the passwords on your email accounts
- change all the passwords to all financial services (banking, Credit cards, Investment portfolios...)
- change all passwords on all your social media accounts
Also, if any of the following is true 7 You any one in your household plays on-line games. 8 You have data that ... you can't afford to loose, or would not like to share with the whole world.
Here are the common ways where you will be exposed
- Infrastructure gets attacked from the world wide web by dual use software that will scan for vulnerabilities on your network literally giving a detailed road map of how to gain access;
- Your WiFi network is easily targeted by individuals that attack router via its default user name and password as well as remote management configurations. If they really want to get in, then they will get in, and they will use software like RouterSploit or MetaSploit to join your network;
- Infrastructure gets attacked by its own edge devices like routers and firewalls, sounds bizarre right, well it’s the most common exploit used by attackers. A hacker will take over an edge device like a router and use the router to attack the owner of the network from within;
- You get attacked via your local network using compromised hardware like other computers on the network. The network can be your home or office network but also that cool VPN network;
- Users get attacked by your IoT devices like a smart thermostat, smart TV’s, smart light bulbs, Air-conditioning, even their own phone via that cool app/ game. All these devices have software that is not designed with security in mind and has no anti-virus or firewall on it;
- Large organizations get attacked all the time via an employee bringing compromised hardware to the workplace or, the user gets compromised themselves when he/she connects to the office.
If you provide us with your email address we will use it to inform you when we detect that your personal data is being sold on the dark-web. If you do not than this feature will only work if your PC is active as your PC knows your email addresses and the intrusion detection service validates those for you.
Some services like emailing customer support or contacting us via WhatsApp requires us being able to identify who you are and that you are a client with an active support contract. It would likely speed things up but most of the time it's not needed.
IDPS comes with several extra layers of protection, the list is not complete but it represents the 6 most common ways ransomware/ cybercrime is used to bypass a firewall:
Windows firewalls leaves a computer wide open to any outgoing communication, even when communicating to known malware-controlled servers, IDPS prevents that.
Cyberattacks are coming at you from all places and at all times, it’s relentless and it’s automated. Windows is extremely “user friendly” in that it allows attackers an infinite number of attacks and actually never takes any defensive measures. IDPS does, if a network scan or attack is detected then any and all access from that source is blocked, even if the attacker eventually would “guess” the right login/password combination or port he will never gain access as he is already blacklisted.
IDPS is fully automated and actively monitors your computer. it requires no user interaction, no data subscriptions, and therefore no computer skills to stop an attacker.
IDPS will detect abnormal communication. If it does, then IDPS will shield your computer and block these computers or smart devices in your office or your home network from harming your computer.
IDPS can send automated firewall abuse reports to the Internet Service Providers that are hosting these malicious activities. If after some time the activity doesn’t stop, then IDPS just blocks the whole data center from accessing your computer and your computer from accessing that data center, it’s like they no longer exist.
IDPS will block domains and IP addresses from known active malicious and or infected domains. This prevents any application on your computer, and not just browsers, from accessing these infected sites. By blocking these domains IDPS also protects you from other attack vectors like spear-phishing emails or macros that use these sites to download malicious payloads. Being able to block malicious domains is important as a blocked domains can’t be used to infect your system.
The cold hard truth is that an Antivirus application only reacts. An anti-virus application works by checking your files against a list of known virus signatures. Think about it this way, last week’s viruses will make it into next week’s anti-virus definitions. If a virus is new and yet unknown, there is nothing to compare it to. IDPS offers a safe environment for these files to be opened, if they execute malicious code, it will do so without causing harm and you won’t get infected.
No, all products are licensed per machine as it is a machine that is protected. The machine can have several users, they will all be protected, that’s fine.
What our customers are saying
"PDF and word guard applications"
The following terms and conditions apply to all software products offered by VESNX. Please note that the terms on this page are a small subset of terms and conditions that can be found at: https://www.vesnx.com/terms.
Products with a perpetual license do not expire and will be maintained by VESNX for as long as the operating system is supported by its vendor."
Products with a subscription are eligible for product updates and support migrations with the vendors operating system.
All products have access to product security updates, normally these updates are applied without you, the user having to get involved. Any products that have dependencies on malware signatures are automatically updated using the frequency in the settings of the products. Depending on the product, these updates could be near-real-time or with an interval ranging from minutes to days.