Agentless Malware Prevention for Your Website Customers

Progressive technology from one of the most experienced teams in security

Trusted By Those Who Matter
Trusted Knight has protected some of the largest brands in the world, including global financial and automotive institutions. Our CEO Joseph Patanella previously founded Trustwave, which now has thousands of employees protecting millions of businesses worldwide. Prior to this he was a technologist at the NSA for 18 years.

Founders and members of our research team also come from the intelligence services and are frequently cited by Tier 1 media. Protector Air has been shortlisted for multiple SC Magazine awards and a Computing Security Excellence Award.

Our Beliefs
Our team has significant cybersecurity experience, we have written books on it, presented at Defcon, built infosecurity businesses and even run operations for the US Army.

This experience imbues everything we do. It is at the heart of our products, people and processes.

We strongly believe the cybersecurity industry is due drastic change. Conventional security products have failed both customers and businesses, which is why we built Protector Air.


Agentless malware protection for your website customers

Injected seamlessly into each web page request, Protector Air disables malware, encrypts data prior to extraction and prevents content manipulation; all with no impact on customer experience.

PROTECTION AGAINST: • Keylogging malware • DDoS and web application attacks • Web injection / man-in-the-browser • User side credential theft

Protector Air requires no API calls, plugins or website changes, just a DNS redirect and SSL certificate. Once in place, website owners protect their customers in three stages

Initial call and response:   
A customer’s web page request routes through Protector Air, is inspected for threats and the site response has a layer of protected Javascript added.

Active protection:   
The Javascript communicates with Protector Air’s cloud-based service to neutralize malware using integrity verification, behavioral analysis, data encryption and by disabling malicious scripts.

Threat Intelligence:   
Threat data is returned to the website owner for reporting, session management and policy development.

Advanced Web Security and DDoS Protection

Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and DDoS protection.

Protector Web eliminates website and application vulnerabilities such as cross-site scripting (XSS), SQL Injection, Remote File Inclusion (RFI) and the OWASP Top-10. It prevents attackers from gaining unauthorized access to web systems, compromising sensitive data and defacing websites while minimizing an organization’s dependency on secure development and 3rd party patches.

The Protector Web Approach
Protector Web is an advanced alternative to a conventional web application firewall (WAF), which addresses the critical WAF deficiencies by using active learning, active content serving and cloud replication. As a result, it dramatically reduces false positives and false negatives, shortens deployment time to hours and eliminates operational complexity.

Protector Web actively scans your applications, learns their functionality, and protects them by understanding the context of each incoming request. As a result, it can accurately discern legitimate traffic from malicious traffic and will not block legitimate requests. By replicating web application components to the cloud, Protector Web removes up to 99% of the attack surface and dramatically simplifies maintenance. It continuously synchronizes with the applications to enable agile and secure application releases and integrate security with DevOps processes.

Active Learning Engine   
An active learning engine rapidly scans the protected web application and learns its functionality. The scan, completed in hours eliminates the conventional learning mode required by WAFs and by application-layer DDoS protection solutions, which can take months to complete. The outcome of the scan process is the mapping of predictable response components and dynamic components of the web application.

Replication & Security Policy Creation   
The cloud-based replica of the predictable response components manages up to 99% of the traffic to the application which dramatically reduces the attack surface and eliminates vulnerabilities (including CMS, 3rd party plugin and web service vulnerabilities). The remaining dynamic content, typically search and login fields, is protected by a greatly simplified security policy.

Context Aware Defense   
Requests to the web application are served by Protector Web, extending your organizations secure perimeter to the cloud. Protector Web handles each request according to its context:

Legitimate request to predictable response components are served statically by the cloud replica and do not require backend processing or any interaction with the original web servers, CMS or database.Malicious requests to predictable response components are not served at all, because the cloud replica only serves request that have been mapped and generated during the Active Learning phase.Requests to dynamic components are validated by the security policy and additional security measures. Illegitimate requests are blocked and only clean traffic is allowed to reach the original application.

Continuous Security Synchronization Continuous Security Synchronization
The Active Learning Engine continuously and automatically scans the protected application and updates security policies to reflect changes to the application. The Active Learning approach enables agile development and continuous integration and release. Deployments are dramatically accelerated and teams are free to rapidly innovate.

Intelligently Simple Endpoint Protection

Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Endpoint further protects internal and external endpoints by actively disabling the keylogging and data-stealing capabilities of malware, preventing the theft of critical corporate or user credentials and other sensitive information that is used by cyber criminals to commit fraud or gain privileged access to the corporate network.

The Protector Endpoint Approach
Protector Endpoint was designed to provide a solution focused on defeating crimeware attacks. Crimeware has become so sophisticated that traditional detect-and-remove strategies of anti-virus are no longer a viable approach and conventional endpoint protection products are often clunky and hard to manage. Instead of attempting to detect and remove crimeware, Protector Endpoint disables crimeware functions to eliminate its ability to collect information. Without browser-entered data, cyber criminals are unable to perpetrate crime.

How it works
The lightweight Protector Endpoint application is installed on Windows-based PCs to support all common browsers (Chrome, Firefox, IE, Opera, and Safari) and has no software or hardware requirements. Protector Endpoint detects browsers and begins protecting immediately after installation, requiring no configuration or user interaction.

Detecting crimeware presence on an endpoint is a losing battle. Instead, Protector Endpoint blocks the limited set of techniques crimeware uses to access sensitive data. Because of this unique approach, criminals never obtain the user-entered data they need to commit fraud and organizations can defend against those attacks responsible for the overwhelming majority of financial losses. Protector Endpoint simple to install and was designed to minimize any impact or disruption of users.

The easiest and most effective way to protect your identity, your family’s online presence, and all of your sensitive information.

Protector Home prevents cyber criminals from stealing any information you type into a web browser, EVEN if your computer is already infected! Without obtaining your information, criminals can’t:

  • Steal your identity
  • Get access to your online bank account logins to drain your bank account
  • Banking logins from bank account logins
  • Commit fraud against you
  • Learn More
    Discover how SecureNation can help you better protect your IT assets.