SlideShare a Scribd company logo
T 8 800 700 55 39, +7 (495) 792 22 74 E info@variti.net
sense of innovation
New generation
of internet cyber
security
Intelligent Active Bot Protection technology β€” traffic analysis,
detection and stop of malicious bots in real-time and effective
response to DDoS attacks without influencing customer experience.
Challenge
Existing methods of protection against
automated attacks do not fully protect
against the smart threats that
are difficult to identify.
Solution
Provide owners of online service with effective
security instruments capable of protecting both
regular and most sophisticated cyber threats. Use
Active Bot Protection as an innovative measure
against all types of automated attacks at the global
level.
www.variti.ch
T: +41 41 417 2057
T: +49 89 215 416 70
E-mail: sales@variti.ch
Internet: www.variti.ch
Variti International GmbH
Denkmalstrasse 2
CH-6006 Luzern
Active Bot Protection β€” is a set of highly optimised
algorithms that allows us to classify online inquiries as
legitimate or illegitimate in real-time.
DDoS protection
without IP-address
blocking
During the attack users are not blocked
and can continue to use the service as
usual. Business processes and thus user
experience are not interrupted, even during
the attack.
Number of blocked IP addresses
during the attack is often seen by many
companies as quality indicator of DDoS
protection. At the same time one
IP address can serve a public
Wi-Fi network or a whole city.
Even single malware inquiry with no known
symptom are recognised and cut off β€”
to protect from attacks on the application
layer.
Common solutions on the market β€”
protecting against attacks at the
Network and Transport layers (L3,4).
Existing methods of L7 attacks
neutralization (detecting and statistical
analysis) are performed with lag.
Protection against
low frequency attacks
on the application
layer (L7)
Protection of personal accounts (including
banks and payment systems) and other
resources containing sensitive information.
Existing methods of protecting have
significant limitations: lag, IP blocking,
inability to block individual inquiries.
Encrypted traffic
protection (HTTPS)
Protection from
automated data
exfiltration
Automatic exfiltration becomes impossible
or economically unattractive.
Legal countermeasures are limited,
human resources are expensive,
technological alternatives are unknown.
Real time protection
starts with the first
enquiry
Protection does not require statistical
analysis. Traffic filtering cuts off bots in
real time starting with the first enquiry.
Existing bot identification services do
not cut off bots in real time; protection
against low-frequency bot attacks
requires statistical analysis; i.e.
lag in protection.
Innovations Customer Benefits Alternative solutions

More Related Content

PDF
Credit card frauds in hospitality
PDF
Privacy-preserving user identity in Identity-as-a-Service
PPTX
How will we prove our idnetities in the future 2050?_Contego
PPT
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
PPS
Mobile Security Blanco/Ueda
PPT
E commerce security
PPTX
Logincat MFA and SSO
Credit card frauds in hospitality
Privacy-preserving user identity in Identity-as-a-Service
How will we prove our idnetities in the future 2050?_Contego
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Mobile Security Blanco/Ueda
E commerce security
Logincat MFA and SSO

What's hot (20)

PPTX
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
PPTX
Cyber security
PDF
Applying Innovative Tools for GDPR Success
PDF
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PPTX
The Road to Intelligent Authentication Journeys
PPTX
Gdpr and smart cities
PDF
Identity Live in Austin Keynote
PDF
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
PPTX
It act chapter 8
PPSX
Web security for e-commerce
PDF
IDM Europe 2017 Conference - GDPR & Data Breaches
DOC
General requirements-for-e-commerce
PDF
AI+Blockchain+IoT Integration Innovation Insights from Patents
PPTX
Cyberpolicy laws
PPT
Towards a Privacy-Friendly Internet of Things
PPT
Bit solutions Company
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PPT
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
PPTX
Ecommerce security
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Cyber security
Applying Innovative Tools for GDPR Success
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Customer Safeguarding, Fraud and GDPR: Manah Khalil
The Road to Intelligent Authentication Journeys
Gdpr and smart cities
Identity Live in Austin Keynote
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
It act chapter 8
Web security for e-commerce
IDM Europe 2017 Conference - GDPR & Data Breaches
General requirements-for-e-commerce
AI+Blockchain+IoT Integration Innovation Insights from Patents
Cyberpolicy laws
Towards a Privacy-Friendly Internet of Things
Bit solutions Company
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
Ecommerce security
Ad

Similar to New generation of Internet Cyber Security (20)

PPTX
An approach to mitigate DDoS attacks on SIP.pptx
PDF
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
PPT
Intellinx.z watch
PDF
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
PDF
Information Security Overview
PDF
Rio olympics ddos attack
PDF
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
PPTX
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
PPTX
Iot(security)
PPTX
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
PPTX
Domain 6 of CEH Wireless Network Hacking.pptx
PDF
Banking and Modern Payments System Security Analysis
PDF
Blueliv Corporate Brochure 2017
PDF
Blueliv Corporate Brochure 2017
PDF
Ipsec And Ssl Protocols ( Vpn )
PPTX
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
PPTX
Digital Forensics Projects Research Topics
PPT
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
PDF
Dissecting internet of things by avinash sinha
PPTX
Cyber security fundamentals (Cantonese)
An approach to mitigate DDoS attacks on SIP.pptx
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Intellinx.z watch
Know More about Core IT Infrastructure Security | Secninjaz Technologies LLP
Information Security Overview
Rio olympics ddos attack
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Iot(security)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Domain 6 of CEH Wireless Network Hacking.pptx
Banking and Modern Payments System Security Analysis
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Ipsec And Ssl Protocols ( Vpn )
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Digital Forensics Projects Research Topics
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Dissecting internet of things by avinash sinha
Cyber security fundamentals (Cantonese)
Ad

Recently uploaded (20)

PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
DOCX
Unit-3 cyber security network security of internet system
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Database Information System - Management Information System
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPT
Ethics in Information System - Management Information System
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introduction to Information and Communication Technology
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Digital Literacy And Online Safety on internet
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Unit-3 cyber security network security of internet system
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Database Information System - Management Information System
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
The New Creative Director: How AI Tools for Social Media Content Creation Are...
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Sims 4 Historia para lo sims 4 para jugar
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Ethics in Information System - Management Information System
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Exploring VPS Hosting Trends for SMBs in 2025
Unit-1 introduction to cyber security discuss about how to secure a system
Introduction to Information and Communication Technology
Mathew Digital SEO Checklist Guidlines 2025
newyork.pptxirantrafgshenepalchinachinane
Digital Literacy And Online Safety on internet

New generation of Internet Cyber Security

  • 1. T 8 800 700 55 39, +7 (495) 792 22 74 E info@variti.net sense of innovation New generation of internet cyber security Intelligent Active Bot Protection technology β€” traffic analysis, detection and stop of malicious bots in real-time and effective response to DDoS attacks without influencing customer experience. Challenge Existing methods of protection against automated attacks do not fully protect against the smart threats that are difficult to identify. Solution Provide owners of online service with effective security instruments capable of protecting both regular and most sophisticated cyber threats. Use Active Bot Protection as an innovative measure against all types of automated attacks at the global level. www.variti.ch T: +41 41 417 2057 T: +49 89 215 416 70 E-mail: sales@variti.ch Internet: www.variti.ch Variti International GmbH Denkmalstrasse 2 CH-6006 Luzern
  • 2. Active Bot Protection β€” is a set of highly optimised algorithms that allows us to classify online inquiries as legitimate or illegitimate in real-time. DDoS protection without IP-address blocking During the attack users are not blocked and can continue to use the service as usual. Business processes and thus user experience are not interrupted, even during the attack. Number of blocked IP addresses during the attack is often seen by many companies as quality indicator of DDoS protection. At the same time one IP address can serve a public Wi-Fi network or a whole city. Even single malware inquiry with no known symptom are recognised and cut off β€” to protect from attacks on the application layer. Common solutions on the market β€” protecting against attacks at the Network and Transport layers (L3,4). Existing methods of L7 attacks neutralization (detecting and statistical analysis) are performed with lag. Protection against low frequency attacks on the application layer (L7) Protection of personal accounts (including banks and payment systems) and other resources containing sensitive information. Existing methods of protecting have significant limitations: lag, IP blocking, inability to block individual inquiries. Encrypted traffic protection (HTTPS) Protection from automated data exfiltration Automatic exfiltration becomes impossible or economically unattractive. Legal countermeasures are limited, human resources are expensive, technological alternatives are unknown. Real time protection starts with the first enquiry Protection does not require statistical analysis. Traffic filtering cuts off bots in real time starting with the first enquiry. Existing bot identification services do not cut off bots in real time; protection against low-frequency bot attacks requires statistical analysis; i.e. lag in protection. Innovations Customer Benefits Alternative solutions