RedSocks as a compliancy tool

Under the new EU GDPR/Dutch Wet Meldplicht Datalekken regulations as of January 1st, 2016, there is a legal obligation to report data leaks.

After years of consulting, drafting and negotiating at various levels, on 15 December 2015 the final compromise text of the EU General Data Protection Regulation (“GDPR”) was agreed.

he Dutch mandatory Bill on Notification of data leaks (Wet Meldplicht datalekken en uitbreiding bestuurlijke boetebevoegdheid Cbp, the Bill) has entered into force already, as of january 1st 2016.

Report data leaks within two days!

Read more!

Malicious Threat Detection

Security products generally attempt to prevent malware infections by inspecting incoming code, scripts and other content. RedSocks, however, uses a different approach: RedSocks Malicious Threat Detection (MTD) focuses on the communication characteristics of malware that has installed itself on your devices. This method provides instant notification whenever a device becomes infected. Whereas other security products have difficulty cleansing existing environments, RedSocks MTD placed in a new environment will effortlessly detect malware that has been present for days, weeks or even months.

Blind Spot in Security
A differentiating aspect of the RedSocks approach is that the MTD monitors outbound network traffic for malicious characteristics. This approach di ers from the traditional security, which typically only checks inbound network traffic. A firewall, for instance, approves inbound traffic by matching it with an earlier outbound request. An anti-virus product approves inbound traffic on content. Both of these methods, however, have blind spots due to their sole reliance on inbound traffic monitoring.

Outbound network traffic will always reveal in what way, by what volume, to what country and how frequent client devices are in contact with destinations on the Internet (i.e., always detect malware activity).
RedSocks MTD is meant to act alongside your existing security measures and acts as a complementary safeguard that is capable of covering the blind spots that traditional tools do not monitor.

When traditional solutions fail, RedSocks MTD will be there to defend your system.

Secure BYOD for business

Leverage the benefit of BYOD but eliminate the risks

The Bring Your Own Device movement is booming, when 3 out of 4 employees using mobile devices the question arise: how do we get security in place? The number of malware on mobile platforms are increasing especially on android devices, given the open nature of it created toolkits build for the device. Attackers take advantage of the connected device and use that as the subbing point for taking control of corporate information.

Secure BYOD in your business, increase employee productivity and allow your workforce doing things where the customer needs them most!  RedSocks technology helps to safeguard your organisation from information theft.

The solution works by constantly monitoring and tracking all user and device behavior in real-time, combined with superior threat intelligence. It works agentless, it is non-intrusive and operator system independent.

Security Information and Event Management (SIEM) and RedSocks

By using a SIEM solution the logging of different security components can be correlated and analysed by time. This requires normalizing the log data of the different security components. This normalisation process enables the SIEM solution to correlate the logs and to identify those events which require a more detailed investigation.

When combining the SIEM solution with the RedSocks MTD solution, you automatically make use of high quality Threat Intelligence incorporated within RedSocks. This eliminates the need to buy separate Threat Intelligence feeds to import in the SIEM solution.