RALEIGH, N.C.--(BUSINESS WIRE)--Cymatic today announced the release of its next-generation all-in-one web application defense platform to protect organizations from Open Web Application Security Project (OWASP) top 10 threats, including compromised credentials and automated attacks, by identifying and blocking attacks at the client before they reach the network.
Cymatic’s revolutionary first-look, first strike capability is earliest in the kill chain, delivering a fundamental shift in traditional approaches to security. By moving protection from the network side to the client, Cymatic provides universal visibility and control to reduce risk across applications, networks, and users while decreasing network traffic loads. The solution is invisible and frictionless to users and deploys in mere minutes.
Instead of just protecting network-based threats like traditional web application firewalls (WAFs), the Cymatic platform uses sophisticated artificial intelligence and machine-learning algorithms to identify and protect against user-derived and device-based threats such as poor credential hygiene, dark web vulnerabilities, and potentially risky devices.
“WAFs are network appliances, insufficient to understand user-based risk and ineffective at providing session-level visibility and control,” said Jason A. Hollander, co-founder and chief executive officer at Cymatic. “The inability to defend against the newest and most widespread attack vectors--which are enabled through a user’s browser--leaves organizations more susceptible to a breach. Cymatic combines all the benefits of a WAF with the intelligence of user and device recognition to combat web application threats without agents, proxies, network changes, signatures, or cookies. Regardless of whether threats come from APTs, organized crime, bad actors, or unsuspecting users, Cymatic can see into each session to provide the highest levels of visibility and protection.”
WAF solutions are handicapped by their outdated architecture and delayed placement in the kill chain. Cymatic has the only all-in-one web application security platform that provides detection and protection where some of the biggest threats arise today--at the user level. The company reimagines the way web applications must be defended by architecting next-generation protections using a revolutionary seamless approach.
“Today, everything happens outside the network,” said Malcolm Harkins, chief security and trust officer at Cymatic. “Technology in the cloud has ushered in a new class of threats that can’t be defeated using tools designed to authenticate packets at the network level. Information and applications are accessed at speed from everywhere, continuously putting sensitive information at risk. To be effective requires the ability to block attacks at the client. Period. It’s the fastest, easiest way to reduce noise and complexity without compromising security efficacy or forcing big budget expenditures.”
Cymatic’s advanced architecture offers unparalleled scale to provide the resilience necessary to validate and process the millions of users and transactions that touch web properties every second. The platform is engineered to work across all web applications regardless of operating system, browser, or device. It eliminates bots, CAPTCHAs, dark web threats, forced MFA, shared accounts, IP threats, device vulnerabilities, and other cloud-based threats with no erosion of the user experience. Cymatic fills the gaps in today’s point products and transforms current silo-driven approaches using an exclusively cloud-native platform to enable live, in-session streaming intelligence across users, devices, and credentials.
Cymatic offers the only all-in-one web application security platform that deploys at the client rather than the network for improved efficacy and ease and speed of deployment. Cymatic’s first-look, first-strike capability is earliest in the kill chain, reducing risk across applications, networks, and users while decreasing network traffic loads. The solution is invisible and frictionless to users and deploys in minutes. Organizations that have web applications rely on Cymatic for real-time visibility and control to protect their web properties from OWASP top 10 threats, including credential-, user-, and device-based threats. Cymatic is headquartered in Raleigh, NC with offices in California and New York. Learn more at cymatic.io and follow Cymatic on Twitter and LinkedIn.