<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

Nexusguard combines a purpose-built, cloud infrastructure, proprietary technologies, 24x7 SOCs (Security Operations Center), and collective intelligence to defend networks from targeted attacks and APTs (Advanced Persistent Threats).

Global Scrubbing Network

Nexusguard’s multi-node scrubbing centers are strategically deployed in traffic-heavy hubs to handle requests, process traffic, and eliminate attacks as close to their source as possible.

Intelligence-based Detection

Nexusguard Threat Intelligence collects and analyzes traffic data from multiple sources, including mitigation platforms, SOCs, industry research, IP reputations, and external intelligence exchanges to identify threats, proactively mitigate them, and enable preventive security postures.

Zero day Attacks

False Positive Incidents

Malicious Crawlers

Blacklisted IPs

Multilayered Mitigation

Our multilayered mitigation platform eliminates massive, complex volumetric Layer-7 attacks in nanoseconds.

High-speed Border Filtering

Defends against bandwidth floods using wire-speed Access Control Lists. Nexusguard also tracks and filters bogus IPs and infected hosts.

Protocol Verification Deep Packet Inspection (DPI)

Filters out SYN Flood and similar attacks that attempt to exploit TCP/IP protocol vulnerabilities. Progressive C/R (Challenge-Response) algorithms distinguish between spoofed and legitimate traffic.

Adaptive Filtering

Guards against Zero-day attacks using statistical analysis and anomaly recognition.

Application-level Filtering

Adaptively learns which applications are running on your network to detect and deter application traffic violations. Nexusguard’s C/R engine assesses malicious traffic, while HTTP Malformed filtering steps in to mitigate application-specific attacks.

Flexible Content Filtering

Deters morphing HTTP Flood attacks by adapting flexible content filters to rapidly counter evasive maneuvers.

Web Application Firewall (WAF)

Protects web applications, mobile apps, and APIs against common threats such as OWASP (Open Web Application Security Project) Top 10 Attacks.

Caching

Provides the last layer of protection, absorbing any attack traffic that may have slipped through the preceding layers.

DDoS Mitigation

Defends websites, applications, and networks from Layer3-7 attacks, ensures 24x7 uptime, and helps maintain high performance and resilience.

Low false-positives keep the end-user experience intact.

Excess cloud capacity handles DDoS attacks of any size.

Real-time attack monitoring triggers immediate protection.

24x7 Security Operations Center

Nexusguard’s SOCs provide real-time network monitoring, early threat warnings, vulnerability advisories, and mitigation and incident response.

24X7 updates on all threats, attacks, and actions taken to handle every incident.

Comprehensive post-attack reports and statistical data delivered almost immediately.

Web Application Firewall (WAF)

Nexusguard’s cloud-based WAF is built upon the ModSecurity Core Rule Set to address the OWASP Top 10 Threats, such as SQL injection, cross-site scripting, and zero-day web application attacks. It also can prevent the execution of fraudulent transactions, stop in-browser session hijacking, and secure AJAX applications and JSON payloads.

Certified by the PCI Security Standards Council, so you can comply with PCI DSS (Payment Card Industry Data Security Standard) without having to invest in costly hardware.

Centrally managed by our security analysts, ensuring that your websites and applications are protected against new and emerging threats.

Collects and shares threat intelligence from a large pool of clients, resulting in improved detection rates and fewer false positives.

Download White Paper
Non-intrusive Authentication

Nexusguard uses a sophisticated set of C/R algorithms to discreetly police suspicious network activity. Only users failing all tests are put to a CAPTCHA challenge as a final gatekeeping step.

Progressive C/R authentication provides multiple layers of defense to detect and block bad bots and malicious traffic without harming the user experience.

Authentication is non-invasive to legitimate users, but effective in blocking all bad bots. No splash or delay screens will irritate legitimate users, even when under attack.

Crawler Identification

Nexusguard uses crawler identification technology consisting of a proprietary signature database to block abusive bots and let in only the good ones.

Bot identification achieves zero false positives and false negatives while detecting and eliminating malicious crawlers, spammers, potential hackers, and other bad bots—even those using forged IP addresses.

Ensures 100 percent search engine access, thereby enhancing SEO efforts and improving organic search engine rankings.

SSL Attack Mitigation

Nexusguard’s SSL attack mitigation protects sites and applications from SSL-based threats. SSL decryption and C/R mechanisms are enforced only on malicious requests.

Secure KMI (Key Management Infrastructure) provides the highest level of assurance for safeguarding private keys. Our KMI is PCI and ISO 27001 compliant, incorporating robust service level-requirements.

Nexusguard takes a “separate key pair” approach to allow clients to retain the private key, while Nexusguard uses the separate key to process Nexusguard-to-Visitor SSL traffic.

Download White Paper