top of page


Adaptive Threat Detection and Protection
Protect your on-line services against today advanced attacks
from compromised web and mobile endpoints without impacting your business and users
“Cleafy continuous threat detection presents a logical approach to securing online transactions as fraud rates, particularly those driven by automated software bots and based on advanced techniques, relentlessly climb. Cleafy also provides unique threat protection capabilities that enhance safe transactions from infected endpoints.”
- Eric Ogren, Senior Security Analyst, 451 Research
WHAT DOES IT DO

DETECT
detect attacks using MITB, MITM, RAT-in-the-Browser, VNC/BackConnect, SMS Grabbing, Mobile Overlay and other techniques
PREVENT
defuse attacks by dynamically protecting delivered content - enable safe online transactions even from compromised endpoints
PREDICT
identify attack campaigns and anticipate attacks from compromised endpoints - assess your risk based on real evidence
RESPOND
activate response mechanisms and selective protection in real-time - support retrospective analysis and forensic investigation
Introduction to Cleafy
Cleafy in 60 seconds

50
BILLION
ANALYZED EVENTS
15
MILLION
USER SESSIONS
10
THOUSAND
POTENTIAL THREATS
3
SINGLE
ATTACK CAMPAIGNS
HOW DOES IT WORK
real-time, client-less, application-independent threat detection and protection
based on innovative and patented technology

TRANSPARENT
client-less: zero impact on end-user experience and endpoint performance
- no touch: no changes to application backend and no changes to applications
DETERMINISTIC
unique full-content (DOM, XHR and API) application integrity, user behaviour and multi-entity correlation - detect 0-days and targeted attacks, no false positives
DYNAMIC
application-independent, selective protection based on detected risk - dynamically protect users performing transactions from compromised endpoints
OPEN
comprehensive APIs to access real-time risk score, threat classification and evidence - smoothly integrate any Transaction Monitor, Case Mgmt and SIEM solution
bottom of page