Centripetal Networks Inc. is a cyber-security solutions provider specializing in Real-Time Active Network Defense. Centripetal has achieved several breakthroughs in the scale and speed of network protection. Centripetal’s RuleGate® product is the first and only system able to action threat indicators at scale, at full line-rate speed, and with agility. Threat intelligence can now directly drive an active cyber defense without negatively impacting network performance or user experience. Centripetal’s offering includes the RuleGate® a unique ultra high performance network appliance, QuickThreat® the industry’s first real-time threat visualization and analytics platform, and the Advanced Cyber Threat™ (ACT) service. Please visit www.centripetalnetworks.com.
RuleGate® is an Active Network Defense appliance with real-time attack visualization and analytics. RuleGate devices protect networks from a variety of cyber threats including hacktivists, cyber criminals and hostile nations, as well as campaigns involving malware, spam, phishing, and scanning. Cyber Analysts visualize break-in and data theft attempts on their networks using QuickThreat®, and adapt their protections to respond in real-time. RuleGate-enforced cyber defenses can be fully automated by subscribing to Centripetal Networks’ Threat Intelligence Partner services as well as Centripetal Networks’ Advanced Cyber Threat (ACT) service.
QuickThreat® shows you the attacks that are attempting to penetrate your networks right now. The RuleGate® filters all of the packet traffic traversing your network, checking for millions of Internet attack sources. As each actual attack is detected and blocked, the RuleGate produces a real-time information feed of the attack attempts. The QuickThreat application reads in the real-time feed and then immediately presents the attack data in multiple forms and visualizations, such as a display of the geographic location of the cybercriminals that are targeting your network. By installing QuickThreat on Windows™ and Macintosh™ Computers throughout your organization, you can give your colleagues instantaneous snapshots of the current threat and the strong protections provided by your RuleGate.
RuleGate® Manager enables System Administrators full visibility into the status and health of their RuleGate® systems deployed in enterprise environments. Security Audit Logs maintain accountability and ensure all transactions, including policy changes, are tracked and available for review. High Availability monitoring can track the status of active ports and other High Availability Peers. Hardware System Status, including CPU Load, Memory Usage, Power Supply Status, and critical system Temperatures can all be monitored to maintain the RuleGate system with the highest levels of service. RuleGate Manager can be installed on Windows™ and Macintosh™ Computers throughout your organization, providing immediate insight for System Administrators.
Policy Manager enables organizations to build, maintain, and enforce cyber-security policies to meet the needs of the individual organization. By integrating threat intelligence from Centripetal's industry leading Threat Intelligence Partners, Customer specific intelligence sources, and Centripetal's Advanced Cyber Threat (ACT) subscription service, organizations can design policies with dynamic threat intelligence. Policy Manager can be installed on Windows™ and Macintosh™ Computers throughout your network security organization.
The Network Threat Assessment Service is an on-site evaluation of the customer’s network security stack. RuleGate® devices are deployed in the customer’s network at key points for real-time evaluation of the security stack. Assessments integrate threat intelligence from Centripetal’s industry leading Threat Intelligence Partners, Customer specific intelligence sources, and Centripetal’s Advanced Cyber Threat (ACT) subscription service.
Centripetal Networks' Advanced Cyber Threat (ACT) service includes over 500,000 unique threat indicators. The ACT feed is updated and improved automatically every day. Many open-source threat sources are currently available, as well as advanced threat feeds. These threat sources can encompass a very high percentage of the entire threat surface. Once the attackers are known, their information can be loaded into a RuleGate®. These policies can be implemented automatically to defend your network against attackers, with virtually no effect on network performance and user experience.