Innoculator’s cutting-edge solution is designed to provide robust protection for your unpatched systems and applications by closing the “Patch Gap”. Our innovative approach centres around virtual patching, allowing you to safeguard even unpatched or even legacy systems. By detecting and alerting /blocking against exploit attempts, Innoculator ensures that your workloads remain secure.
Innoculator is made up of three main components. First is the A.I. Signature engine. With this Innoculator is able to generate signatures to monitor for any CVE that has example code/ Focusing on solving the issue of legacy applications in a network environment, we realise that for some very old systems, support/ patches are no longer created. Using the power of A.I. , Innoculator can take your vulnerability scans, and generate the relevant signatures you need to protect your applications.
Centralised control with a focus on integrations. We recognise that Security teams are not looking for a new dashboard. Our centralised control plane allows you to setup and configure your network segments/ applications, apply virtual patches, and manage where alerts are sent.
Using a distributed approach to deploy the Innoculator Network Inspector helps overcome traditional technology challenges. In the past, these have been deployed on your main traffic pipeline and tasked with analysing in real time high volumes of traffic while comparing to a vast number of signatures. This results in latency and a slowdown of your network.
Innoculator uses a network traffic inspection signature detection model , but repurposes it to overcome these shortcomings. First, we deploy the Inspector inside your network on appropriate or relevant segments. Secondly, we are only looking for the signatures that effect specific workloads/servers identified as unpatched. This means we are reducing the amount of traffic to inspect as well as the number of signatures, resulting in virtually no network impact.