OZON Platform
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Insufficient risk management

Values

Ensure Security and Business Continuity

Manage Risks

OZON Platform

OZON solution protects business against all cyber threats: hackers, fraudsters, badbots and malware. In real time, dynamic protection system detects and blocks cyber attacks targeting your website.

Description

A unique combination of innovative cybersecurity technologies,
automated processes & human expertise. Anti-virus and anti-spam are no longer adapted against new cyber threats
Web Security. Website traffic is analyzed in real time to insure a protection against cyber-attacks such as injection, denial of service, robots propagating malicious programs or stealing data.
Protection against all web cyber attacks Full protection against all web cyber-attacks (DoS, DDoS, SQL injection, XSS, RFI/LFI, Directory Traversal…) targeting your website, data and transactions. Vulnerability detection. Automatic and periodic security flaws detection of the protected website in order to generate the appropriate protection rules. HTTPS security. SSL/TLS software stack secure configuration and SSL/TLS certificate lifecycle management with automatic renewal following cryptographic state of the art. Email Security. Before being delivered in coworker mailbox, each email is analyzed in real time to insure a protection against attacks such as malware, phishing and spear phishing. For maximum efficiency, several complementary security technologies (heuristics, artificial intelligence and predictive) analyze email origin, content and context. Protocol analysis. To detect and block malicious emails, the first technique is to perform a protocol analysis. This first scan can quickly eliminate a large number of threats, including massive attacks.
Heuristic analysis. The heuristic analysis of the entire content of the email (header, URL and attachment) can detect and block more sophisticated attacks like malware and phishing.
Predictive analysis. Unique predictive technology can analyze the context of email as a whole. Regardless of language, this innovative technology can identify behavioral anomalies and block new cyber-attacks in real time. Endpoint Security. Each Windows or MacOS workstation is protected against all types of malicious programs (virus, trojan, ransomware, crypto-miner, …). A software agent is deployed on each desktop/laptop to perform a heuristic and behavioral analysis of all processes. The integration of artificial intelligence and machine learning technologies makes it possible to detect sophisticated malware. Protection against malware. Detection and blocking of sophisticated malware without relying on a signature database.
Protection against ransomware. Avoid data encryption by a ransom program.
Protection against malicious sites. Navigate the Internet safely. Access to a malicious site is automatically blocked.


Scheme of work

 Scheme of work