Magnus offers cloud-based services that prevent bots from damaging a firm’s website or mission-critical applications. According to Gutzmann, the unique aspect of Magnus’s solution is that they do not use ‘signature deduction’ or after-the-fact signature-based request filtering techniques. “The typical modus operandi requires customers to provide their SSL decryption keys and certificates to the vendor for analyzing the customer's traffic, posing a major compliance problem for many businesses such as internet banks,” explains Gutzmann. Magnus' counter measure is able to neutralize bot attacks, prevents infiltration, and consumes attackers.
Magnus protects content at the site or sub-site level, and/or specific transactions such as account logon, purchases, money transfers, and stock trades. The operation of our solution is completely undetectable by a human using a browser, which eliminates the need for irritating measures like captchas. Through the addition of a Magnus-provided client-side script to the site or forms, visitors are engaged in the protocol before gaining access to a firm’s content or transactions.
The operation of our solution is completely undetectable by a human using a browser, so irritating measures like captchas are not needed
In addition to DDoS, the Magnus solution contains a suite of products that can be used individually or all employed together to protect entire websites, specific website transactions, mobile applications, and even embedded devices. One of the company’s current clients operates an extensive device-management service (IoT) that involves environmental compliance. “It is critical that customers have the ability to monitor and manage these devices continuously and that they are protected from any unauthorized access,” asserts Gutzmann. “Magnus ensures the availability and integrity of their service.”
Surging ahead, Magnus will continue to offer distinct preemptive countermeasure solutions that eliminate any cyberattack or network threat. Magnus will evolve in the technology that will help clients know what assets the bots might attack and where the bots are from. “Our solutions will persist on representing substantial advancement in cybersecurity defenses, providing an application-layer attack countermeasure while working with traditional network-layer solutions,” concludes Gutzmann.