Attack Shield

SD-WAN with Cyber Security for Small Businesses

Attack Shield

SD-WAN Add On

Small businesses need affordable protection from online attacks, especially those that try to overwhelm their systems.

Traffic Flow Analysis Tool

Attack Shield is a traffic flow based analysis tool, designed for small and micro businesses facing the challenge of costly and resource intensive DDOS Cyber protection. It efficiently analyzes and manages traffic flows within the limitations of small office devices, providing a balance between effective protection and normal application operation. The solution predicts, protects, and reports on DOS/DDOS attacks.

Uses the Metadata-Traffic-Controller (MTC):

RabbitRun Technologies uses a Metadata-Traffic-Controller (MTC) to power all SD-WAN devices in a Stateful System, monitoring all traffic flows passing through the our routers.

Understanding Traffic Flows:

Flows are like conversations between two points passing through or going to the device. They provide essential traffic information, including additional metadata.

System Resources:

Small office devices have limited memory, affecting the number of flows they can track. The RRT-200-LTE, in normal operation, supports a maximum of 16384 flows, more than enough for a small office SDWAN setup.

Flow Management:

Tracked flows eventually timeout, allowing new flows to form. However, relying solely on flow timeout isn’t effective against DOS attacks, and adjusting these settings can impact normal operations.

Attack Shield Features

Detect, Prevent, Protect, and Analyze Attacks

This is a new and novel approach using intelligent Traffic Flow Analysis from the SD-WAN Router’s Metadata.

Automatically Detects & Quarantines:

     Supports Block & Allow Lists

     Handles Heavy Attack Purging

3 Modes of Operation & Sensitivity:

     Low – Catches Mostly Larger Attacks

     Mid – Catches Large to Moderate Attacks

     Aggressive – Catches Small to Large Attacks

     Custom – Expert Mode

Inspects LAN & WAN:

The solution can also find compromised internal devices that have launched attacks to outside world targets to help protect upstream supply chain connections.

     Inspects World to LAN

     Inspects LAN to World

Cloud Portal Reports & Alerts:

Receive alerts and analyze historical state changes and attack data.

     Attack Alerts

     Attack State Change History

IF YOUR CUSTOMERS ARE LOOKING FOR
“ALWAYS ON VOICE & POS”, WE HAVE THE SOLUTION!

Let’s Work Together – Partner with Us!