NormShield Blog

About Normshield

SLA Calculations with NormShield

NormShield; A service-level agreement (SLA) is mainly about a delivery time contract between a service provider and the end user that defines the level of service expected from the service provider. SLAs are one of the most important factors that get the job done in companies and enterprises, moreover it’s a key aspect of unified […]

Fraudulent Domains

Introducing NormShield Hotpoint

NormShield solution can be utilized both on and off premises. Off-premises is easy to use with no extra effort since it’s cloud base. On-premises version needs to be updated as NormShield evolves and for, why of course, bugfixes. Here’s the main interface of NormShield Hotpoint, as the name implies, of which you can use for; […]

normshield manage risk

Hiring for NormShield!

Hiring for NormShield! Howdy to all pythonistas out there! We need a developer who like and already devoured the Zen of Python. The position is for our ongoing process of our cyber intelligence technology. If you want to deal with big data, keen for solving hard problems, this one is definitely for you. Long story […]

Phishing Domain Detection, Machine Learning,

Keep on Top of Your Network

Keep on Top of Your Network; Almost always the network under responsibility is big enough to get complete control for information security specialist. Specialists are always simply being outnumbered. NormShield can help here for both intranet and internet facing servers by scheduling an asset discovery process. Once a server is identified at time period as […]

Data Leakage

Data Leakage Primer

Data Leakage; There are various cyber threat intelligence venues and NormShield has started its exploration for some time now. One of the features it offers is to search paste portals for specific criteria (keywords, emails, domains, cc numbers, etc.) with of course a notification end.

cms vulnerability

Smart Solution, Smart Aggregation

Smart Solution, Smart Aggregation; Think of the vast amount patch related of vulnerabilities you get after an automatic scan; for example insecure Apache httpd version. Frequently, these issues can be grouped since they are related to Apache httpd and instead of using different names one can show all these vulnerabilities using a single name. This […]

Social media Reputation

Monitoring Your Social Reputation

Social media has become the key medium for connecting existing and/or prospective customers. It is imperative for any enterprise to use social media actively and effectively. Hackers, too, are extremely interested in social media and they use social media for fun and profit. They both publish their findings about successful hacks and plus hack into […]

Ecosystem Cyber Risk Manager

Passive Vulnerability Scan & Early Notice for Non Remotely Scannables

Passive Vulnerability Scan; Vulnerabilities such as MS15-034 are big deal for information security specialists who have to keep up with the critical security patches on high pressure business environments. In one hand they know that the cat is out of bag and they have to find out their vulnerable servers, however, on the other hand […]

Steep Increase in Discovered Vulnerabilities in 2014

Vulnerabilities in 2014; According to the Secunia, a total of 15,435 vulnerabilities were discovered in 3,870 products during 2014. This is a 55% increase compared to the previous 5 year long discovered vulnerability trend. Another important piece of information is that of those 15,435 vulnerabilities 60% of them are triggered remotely. Yet another proof that […]

NormShield Threat Vulnerability Orchestration

All Features Are Equal

All Features Are Equal… But Security Is More Equal Than The Others… Security is built in form the head start in NormShield. It contains secure features as well as security features. The software is designed and developed and tested by seasoned application penetration testers, senior developers and software security professionals for whom coding is part […]