Using Quttera to detect and protect network assets from network threats

Quttera provides a SaaS-based malware detection solution to identify the unknown and "zero days" and remind users? Threats on the website. Their technology combines artificial intelligence, multi-layer identification engine, scoring layer and other methods based on non-signature, making network malware detection faster and easier. In this interview, MichaelNovofastovsky, co-founder and chief technology officer of Quttera, discussed the threats and challenges faced by current network security, and provided an elegant solution for SMEs.

Please describe the story behind the company: what inspired this idea and how it developed to this day? Quttera is an innovative solution center for network malware. The three co-founders, including me, set a goal to improve the existing anti-malware tools and overcome the limitations in the industry, such as signature-based solutions, malware laboratories that rely heavily on manual research and zero-day attacks.

Is our first patent registered in 2009, aiming at detecting vulnerability attacks in given code or information. The algorithm and mathematical model in the patented method lay the foundation for the technology based on heuristic and artificial intelligence, which is called Quttera.

Since then, we have been developing new tools and services to detect, delete and protect network assets from known and unknown network threats. Our technology has developed into a multi-layer and multi-functional heuristic technology, which can work without signature. Most importantly, its design is flexible and can be adjusted according to the needs and specific circumstances of any application. Any client system can easily integrate it and begin to use its ability to find hidden threats, adjust and protect data, and connect to a centralized threat intelligence database.

For example, SME owners use our technology through ThreatSign, a SaaS website protection platform. Threat labs, e-mail clients, telecommunications, hosts, security providers, cloud storage, advertising inventory, Internet of Things devices and almost all network connection assets can use our technology through RESTAPI.

Quttera's products and services include web application firewall, external malware scanning, server-side malware scanning, SSL management, automatic malware cleaning framework, open port scanning, DNS attack monitoring, blacklist checking, uptime monitoring and other security functions.

Let's briefly introduce Quttera's ThreatSign platform:

What are the threats that network companies should pay attention to at present? Malware, spam, form data theft, denial of service, ransomware and traffic theft are just a few of a long list of threats. You can find a detailed classification of real examples of each threat on our blog, but it is too difficult to list all the threats here.

I would say that the biggest threat or the main reason for enterprises to be attacked is the lack of safety education. According to our poll, it seems that many owners of small and medium-sized enterprises think that their small websites or landing pages are not the target because they have no huge income or no income at all.

It leads to improper selection of network host and website platform, completely ignoring network security, and soon leads to infection. Although the statistics of ThreatSign show that more and more websites actively establish protection here, most new customers are still seriously infected and blacklisted by companies such as Google and Norton. Malware and hacker attacks have become more complex and automated. Another interesting statistic is that a typical commercial website is attacked more than 40 times a day.

Who are the threat participants and what are their motives? Most of the threat participants we see from the affected customers who registered with our SaaS platform Threat Sign for Remedy are cyber criminals, hacktivists and thrill seekers. Their motivation is: profit-whether to distribute SEO spam, phishing spam, email, credit card information theft (skimming), clickjacking, traffic theft, ransomware or DDoS. These criminals often move around the world and have a lot of resources. 1_ website defacement and DDoS attack. Their purpose is to prevent the website owner's information from being passed on or replaced with different information. Play hacking games. They are usually the least sophisticated attackers, using devices at home. However, they can do serious harm to vulnerable sites. What measures are the authorities taking to stop cyber crime?

Law enforcement agencies around the world are cooperating to track down and shut down cyber criminals. This process is difficult because professional threat participants know how to hide their whereabouts. Many of them work in countries where the government is not very cooperative. Despite the difficulties, the law enforcement departments have taken some impressive actions. But the investigation may take years, and at the same time, websites all over the world have become victims. New gangs have replaced closed gangs. Law enforcement cannot eliminate the need for strong website network security.

How do you think CCPA will affect the e-commerce industry? CCPA requires companies doing business in California to use reasonable procedures to protect their consumer data. This is a wake-up call for those who are careless. They need to prove that they have taken network security measures to protect their customers' data from being destroyed. Many start-ups are providing compliance services, but not all companies are doing well. Enterprises that provide cheap and low-quality services and think they are protected may suffer costly disappointment.

The smallest enterprises are tax-free, and they are usually the enterprises with the worst security measures. They should not use the lack of legal obligations as an excuse to ignore safety. CCPA is just another reason why they should do something: implement thorough and powerful security protection for their websites and sensitive data. In addition, other regulations such as GDPR are also promoting the development of online business in the same direction. Security has always been crucial, but these laws remind people of the need to prevent data theft. Enterprises need the help of companies with mature professional knowledge to reach the level of network security required by law.

In view of the great transformation of home office, what should enterprises do to ensure its operation? When enterprises operate remotely, they face many challenges in ensuring operational safety. Whether making everyone work from home or transferring all business to the network, these five key functions are:

Availability: The solution should be highly flexible and available, because any downtime will affect employees and customers and bring heavy costs to the enterprise. Scalability: The solution should be able to handle thousands of connections. Flexibility: The solution should support scaling in minutes or hours, while minimizing ongoing maintenance and cost requirements. Simplicity: The solution should provide the choice of proxy-based or agentless services. Security: Solutions must be intrinsically secure and provide a way to set stricter controls at the global or local level. What trends and technologies do you think are particularly interesting now? Cloud and Internet of Things are simple. The physical world and the digital world will inevitably become closer and closer, and change the way we live, work, study and daily activities. Smart connected devices and their digital twins will continue to communicate in real time. The Internet of Things will eventually enter every industry and bring more aspects of our lives into "virtual reality". I like to watch the demonstrations of new AR/VR experiences, Industry 4.0, smart homes, smart medical equipment and other exciting experiences that will soon be popularized.

How do you look forward to the future of your industry? Bad actors interfere with and control any point in the Internet of Things chain in any possible way, which will cause physical harm. Therefore, I can foresee that more and more suppliers are aiming at the scanning, management and protection of IOT assets. When SMB/SME adopts the Internet of Things, the market will become huge, whether it is servers, controller devices that receive traffic or digital twins that exist in any digital model. All these operators will be the targets of hackers, so they must be protected by network security solutions.

Today, our ThreatSign website security network handles about 52 million requests every quarter, preventing 6.5438+200,000 malware attacks on average. When the Internet of Things enters, you can imagine a network composed of scanned and protected Internet of Things assets and other useful statistical data to manage and evaluate the security of the company's Internet of Things business. We don't know what this will be like yet, but it's for sure. I believe that every network security provider is working hard to prepare its own technology and infrastructure, find obstacles and challenges, and ensure that it is ready for everything brought by the Internet of Things.

With new technology, it will be faster and easier to create and launch new websites. Therefore, it also promotes the demand for rapid deployment of network security defense. One of our directions is to create a 360-degree security solution based on the cloud, without server protection, repair and monitoring, which enables us to extend and provide flexibility, simplicity and, of course, security. All our protection modules, such as WAF, are already located locally in the cloud, and we are using Kubernetes to support customers and mitigate DDoS attacks.